{"content": "HC refuses to stay ZP poll process\n\n\n\n\nRefusing to stay the ongoing zilla panchayat election process, the High Court of Bombay at Goa on Tuesday said the ZP poll results of the Usgao-Ganje, Guirdolim and Colva constituencies are subject to outcome of petitions filed before the HC. Petitioners’ pleas have challenged the\n\nconstitutional validity of power vested in the government to reserve the ZP constituencies of Usgao-Ganje, Guirdolim and Colva.\n\nThe reservation of ZP segments has dashed the hopes of some local politicians including former two-time South Goa ZP chairperson Nelly Rodrigues, a satrap in the Colva ZP segment.\n\nThe Colva ZP constituency has been reserved for women belonging to other backward classes, leaving Rodrigues with no option but to opt out of the polls.\n\nThe Guirdolim constituency has been reserved for women. The grievance here is that the segment has been reserved for women for the third consecutive term, upsetting BJP MLA Clafasio Dias who has threatened to resign from the party.\n\nThe Usgao-Ganje constituency has been reserved for scheduled tribes.\n\nIt has been alleged that the government has reserved their strongholds so as to clear the way for ruling party nominees.\n\nIt has also been alleged that the state election commission did not   have a role in reserving the constituencies for women and OBCs, and that it is the state government’s notification which reserved the constituencies giving advantage to the ruling party.\n\nThere are 50 ZP seats in both the districts of the state; of which 30 have been reserved for women, scheduled tribes, scheduled castes and OBCs.", "pred_label": "__label__1", "pred_score_pos": 0.9917778372764587} {"content": "Lilim Heritage Online - Chapter 112\n\nPublished at 1st of September 2019 05:05:08 AM\n\nChapter 112\n\nChapter 112 – The Gateway\n\nPutinof Colony #13\n\nWithin the central pyramid, LHO Department staffs, the administrative group who oversaw Lilim Heritage Online game, were in an uproar .\n\nAfter the confirmation of Shurka's transformation, they coordinated with MWG intelligence agents, reporting this finding to the higher-ups as they were trained .\n\nOn the ground floor, an elder, who looked like Professor Fortune Luckyaf, teleported into the pyramid building .\n\nDr . Fluke Luckyaf rushed to the game company with a frustrated expression .\n\nHe was Professor Fortune Luckyaf's elder brother, and he was also Shurka's uncle . Dr . Fluke was the one who rigged the VIP10 authority and many items in her VIP inventory . It was also him who suggested that Shurka should use her real appearance in-game as a lifestyle player .\n\nUnfortunately, he received an urgent report from an insider, telling him that Shurka met with an impossible incident .\n\nShe ate a hydra core!\n\nAs many alpha-testers came back as overminds last year, Dr . Fluke had many test subjects, which he had learned many things from the overminds in MWG .\n\nThe hydra core had a similar property with the dragon's blood, which he had tested the blood with the golden generation crews, including Mia . They turned any human into an overmind!\n\nIn Mia's case, it even transformed his outward appearance and bestowed them the Electrokinesis abilities, which were thunder type psychic powers .\n\nOn the contrary, Shurka and other prior testers, who had consumed a hydra core, did not obtain any psychic ability aside from the psionic powers . Dr . Fluke and many other scientists concluded that this hydra core was inferior to the dragon's blood .\n\nGetting another overmind into their world was a piece of good news to MWG, and it boosted Dr . Fluke's credibility in the government . However, having his relative being another test subject was a different story . He could not afford to let his niece entering those testing grounds he created .\n\nShaking away all security guards and reception staffs, Fluke Luckyaf teleported to the higher floor . He barged into the director officer, grabbing the game director by the collar .\n\nLobnoi, an android subordinate of Fleet Admiral Gabriel Lobmak, looked at the assailant with a wide grin .\n\n\"Android, I need an explanation . How the fuck has my niece become an overmind!?\"\n\nLobnoi shrugged, \"Not my fault . It was your creation that forcefully fed your niece with a hydra core . Heck, this is your karma in the first place!\"\n\n\"You have the power to intercept this! Why didn't you interfere with them!?\"\n\n\"Eh, Fluke . Do you think we can do anything in there at all? Lilith has been restricting our control lately, and we can't afford to offend her . Do you understand what will happen to the billions of our population in her domain if we piss her off? Right now, we're nothing but doormen!\"\n\n\"This is what happened when you created too many games in her dimension! You go tell the MWG and your brother that my niece has nothing to do with their immortal project . \"\n\nLobnoi smirked, \"Too late . \"\n\nDr . Fluke pulled out a beam pistol in the shape of a ball pen and plugged the small muzzle into Lobnoi's left ear .\n\n\"You tell them to cancel their abduction plan, or I'll fry your brain from the inside . \"\n\n\"HAHAHAHA! Oh boy, go ahead, Fluke . I've backed up my memories this morning . Even if you kill me, I'll be back here again tomorrow . Then, you'll be the enemy of the galaxy like the silver empress!\"\n\nFive securities entered Lobnoi's office with handguns, which had been loaded with specialized subjugation shells, pointed their muzzle at Dr . Fluke .\n\nThe security leader hesitated . He lowered his gun and approached both of them, \"Dr . Fluke, please drop the gun . \"\n\n\"You motherfuckers back off or I'll kill him . \"\n\n\"Sir, we all know that he will be resurrected within minutes even if you killed him . Please think of your past achievements and your family . You don't want to be like the silver empress . If you stop this now, we won't tell anyone outside, and the MWG won't know about this . \"\n\n\nDr . Fluke glared into Lobnoi with hatred and regret, \"I shouldn't have worked for MWG!\"\n\n\"You contributed to us well, doctor . \"\n\nUnwilling, Dr . Fluke pulled the pen pistol away and gave it to the security leader . All the guards put away their guns and gestured the senior to leave the building with them .\n\nLobnoi adjusted his suit, \"Don't worry . An overmind doesn't much value compared to Uriel Mia . Heck, we have too many overmind subjects back in the labs already . I doubt they will make it hard for you and your family . \"\n\nShaking off the hands of the securities, Dr . Fluke grumbled, \"You will regret this if I find any asshole show up at my niece's resident . \"\n\nDr . Fluke disappeared from the location on the spot . He activated his psychic ability and teleported away .\n\nSeeing that Dr . Fluke had left, Lobnoi gestured everyone to leave him alone . His smiling face grimaced, and his frantic hands reached for the nearest keyboard of his internal computer, typing his password with haste .\n\nSponsored Content\n\nEntering his console menu, he skimmed through the log files of Lilim Heritage Online, searching for Shurka's gaming logs .\n\nUpon finding the file, he attempted to copy the entire log messages into his artificial brain cells, but he received an error .\n\n\n<>\n\n<>\n\nLobnoi frowned, \"She closed the gate again? She closed it too often . What's wrong with her!?\"\n\nInstead of copying Shurka's file, he read the log details .\n\nAs he was busy reading through the activities, a news feed shocked Lobnoi .\n\n<>\n\nLobnoi stared at the new alert with round eyes, disbelieved .\n\nHe picked up a blue cube ball and established his telepathy, calling his master through the direct communication channel .\n\n\n[Android? What's the matter? It has to be urgent . I'm busy right now . ]\n\n\"Master, we have another dragonewt . \"\n\n[Huh? Has one of our agents succeeded?]\n\n\"No, Fluke Luckyaf's niece contacted with Uriel Mia, and he forced her evolution . \"\n\n[Ho? That makes thing simple . I'll take it from here . ]\n\n\"Master, Dr . Luckyaf was here because of her niece's incident . I'm afraid he might mobilize his private fleet . \"\n\n[Eh, his fleet is not as competent as the silver empress . Leave everything else to me and resume your post . ]\n\nSponsored Content\n\n\nGabriel disconnected the device . Lobnoi sighed a relief as he completed his duty .\n\nNow, he could relax and watch over the game system, the gateway, and Lilith .\n\n*Whrrrr* *Whrrrr*\n\nBefore Lobnoi could sit and relax, a red light flashed from one of the monitoring officer's table . The officer stood up and shouted in a panic .\n\n\nAnother officer also bellowed, \"ALL LOGS ARE OFFLINE!!\"\n\n\n\n\n\n\n\nThe frantic Lobnoi rushed to the operating room, \"Can anyone connect me to Lilith?\"\n\n\"We've tried, sir! She only left us a message . \"\n\n\"What message?\"\n\nThe officer trembled as he did not dare to repeat the message . He shifted his screen so that Lobnoi could read it .\n\n<>\n\n<>\n\n\nMeanwhile, on a grassland, Lilith coughed and adjusted her throat, getting ready to broadcast her announcement .\n\nAs soon as she was ready, fifty monitors, featuring fifty worlds were before her .\n\nLilith transformed a stalk of grass into a golden microphone, and she began .\n\n\"Ladies, and gentlemen . It's me, your friendly Goddess Lilith!\"\n\nHer voice echoed throughout the fifty worlds, shocking all trillions of residents .\n\n\"Are you having fun in your game? I'm sure you have . \"\n\n\"So far, I've hosted 15 MMO games inside my dimension, and I've allowed many mortals to live here as immortals . However, it stops today . From now on, all of you will age and die like ordinary humans, elves, dwarves, and any race you are . Also, all kinds of resurrection and respawning will be disabled! You will die for real if you die again . \"\n\n\"Still, there are many casual players that haven't planned to live here . I understand that . Therefore, I'll give everyone a chance to log out, but you'll have to pay a toll fee . \"\n\nLilith's face revealed a sinister smile, \"The payment will be VIP Diamonds! For each soul you wish to transfer, log-in, log-out, or item transfer between worlds, you'll have to pay 100 Diamonds as a monthly subscription to use the soul transfer option!\"\n\n\"If you don't pay it, you can stay in my dimension for all I care . \"\n\n\nNot only the players in 15 MMO games heard the voice, Uriel Min, Gabriel Lobmak, and others in the real world could hear it as well .\n\nGrandmother Min's face grimaced as she knew the value of diamonds . They were expensive for a reason .\n\nThese diamonds were not created in a digitalized world, but they were constructed from real materials, which was more valuable than a psionic core .\n\nEach Diamond contained a mysterious energy source . Find authorized novels in Webnovel,faster updates, better experience,Please click www . webnovel . com for visiting .\n\nInside a diamond, it housed a soul!\n\n\nMia also received a special message from Lilith .\n\n[In your case, you'll have to pay extra diamonds if you wish to bring your harem back to your world . ]", "pred_label": "__label__1", "pred_score_pos": 0.6022614240646362} {"content": "Cookies Policy\n\nAs we inform you when entering, on this website we use cookies to improve your experience on our website. If you have accessed and continue browsing, you agree to the installation of these cookies. If you do not accept them, we will explain later what you must do to deactivate them.\n\nCookies are defined as small text files that a website stores in the user’s browser and whose function is to facilitate the use and navigation of that website, being in some cases essential for its operation.\n\nWhy are cookies used on this site?\n\n\nHow can I manage and deactivate these cookies?\n\nIn the case of not wishing that the website does not install any cookies on your computer, it is possible to adapt your browser so that you are notified before any cookies are downloaded.\n\nIt is also possible to modify the configuration of the browser so that it rejects cookies. You can also delete any of the cookies that are already on your computer. Keep in mind that you will have to adapt the configuration of each browser and equipment you use separately.\n\nhttps://www.thecreditfixdoctor.com/ makes available to users who want to prevent the installation of the aforementioned cookies, links provided for this purpose by browsers whose use is considered more widespread:\n\nGoogle ChromeInternet ExplorerMozilla FirefoxApple Safari\n\n\nFill in this small form with your name and email, and receive a completely free consultation.", "pred_label": "__label__1", "pred_score_pos": 0.566004753112793} {"content": "Sponging   disallowed (Read-only view)\n\nA location is a point or area of interest from which a particular product or service is available, e.g. a store, a bus stop, a gas station, or a ticket booth. The difference to gr:BusinessEntity is that the gr:BusinessEntity is the legal entity (e.g. a person or corporation) making the offer, while gr:Location is the store, office, or place. A chain restaurant will e.g. have one legal entity but multiple restaurant locations. Locations are characterized by an address or geographical position and a set of opening hour specifications for various days of the week. Example: A rental car company may offer the Business Function Lease Out of cars from two locations, one in Fort Myers, Florida, and one in Boston, Massachussetts. Both stations are open 7:00 - 23:00 Mondays through Saturdays. Note: Typical address standards (vcard) and location data (geo, WGC84) should be attached to a gr:Location node. Since there already exist established vocabularies for this, the GoodRelations ontology does not provide respective attributes. Instead, the use of respective vocabularies is recommended. However, the gr:hasGlobalLocationNumber property is provided for linking to public identifiers for business locations. Compatibility with schema.org: This class is equivalent to http://schema.org/Place.\n\n% meta-cartridges called:\nMeta-cartridge [execution time]:", "pred_label": "__label__1", "pred_score_pos": 0.8403567671775818} {"content": "what are the germanic languages\n\nThey all descend from Proto-Germanic, and ultimately from Proto-Indo-European. Additionally, several creoles, patois, and pidgins are based on Dutch, English, and German, as they were each languages of colonial empires. But in the case of the Germanic family, there are no records of the parent language, called by linguists Proto-Germanic. German language, German Deutsch, official language of both Germany and Austria and one of the official languages of Switzerland. The Germanic languages are separated into the East Germanic languages (all extinct), the North Germanic languages and the West Germanic languages. They came from one language, \"Proto-Germanic\", and were originally spoken in Northern, Western and Central Europe. English. Each subfamily in this list contains subgroups and individual languages. The Department of Germanic Languages will therefore offer courses for undergraduate students (and, in some cases, for graduate students) in each of these terms. German is a West Germanic language within the Indo-European family of languages and, as such, contrasts with Danish, Norwegian, Swedish and Modern Icelandic, which are North Germanic languages. Fortunately, there is the language difficulty ranking provided by the Foreign Service Institute, and it does not include only Germanic languages, although I … A.D. This division had begun by the 4th cent. German. In teaching and research, we emphasize the embededdness of language, literature, and the arts in larger social, cultural, and political processes. From these three branches, we can group all the Germanic languages we know today. Germanic languages are English’s distant cousins, so to speak. Research Associate, Department of Linguistics, University of Chicago. West Germanic languages. History. Germanic definition: If you describe someone or something as Germanic , you think that their appearance or... | Meaning, pronunciation, translations and examples The East Germanic group, to which such dead languages as Burgundian, Gothic, and Vandalic belong, is now extinct. However, the oldest surviving literary text of any Germanic language is in Gothic (see Gothic languageGothic language,dead language belonging to the now extinct East Germanic group of the Germ… Modern English is derived mainly from the Germanic dialects spoken by the Angles, Saxons, and Jutes (who all arrived in Britain in… Explore the German language in Austria from a sociolinguistic perspective. The West Germanic languages constitute the largest of the three branches of the Germanic family of languages. Welcome to Germanic Languages & Literatures Our department offers undergraduate programs in German , Scandinavian , and Dutch and a graduate program in German Studies . The Germanic languages are a language family in the Indo-European languages.They came from one language, \"Proto-Germanic\", and were originally spoken in northern, western and central Europe.. English and Frisian are descended from North Sea Germanic. The broad range of studies offers training in specialized fields such as film, linguistics, and critical theory. By signing up for this email, you are agreeing to news, offers, and information from Encyclopaedia Britannica. The Northern Germanic languages (also known as Scandinavian or Nordic languages) include Swedish, Norwegian, Danish… The following languages are considered North Germanic: Swedish, Danish, Icelandic, Norwegian, Faroese, and Elfdalian. The most striking changes that distinguish them from the other Germanic languages ... Frisian. This figure also encompasses speakers of Northern Low Saxon, a dialect of West Low German. South Germanic languages, an attempt to classify some of the West Germanic languages into a separate group, is rejected by the overwhelming majority of scholars. These languages are spoken in Norway, Sweden, Iceland, Greenland, Finland, Denmark, and the Faroe Islands. These include German and Dutch on the Continent, and the Scandinavian languages in the northern regions. Help support true facts by becoming a member. The Germanic languages are separated into the East Germanic languages (these are no longer spoken), the North Germanic languages and the West Germanic languages. The three most prevalent West Germanic languages are English, German, and Dutch. But the Germanic peoples, as the maps show, went many other places during the years 300-1100. The Romance languages, for example, are derived from Latin. From early Northern Middle English (Aitken, A. J. and McArthur, T. Eds. an Indo-European language belonging to the West Germanic branch; the official language of Britain and the United States and most of the commonwealth countries Linguistic characteristics of the protolanguage, https://www.britannica.com/topic/Germanic-languages. Germanic languages continued to be spoken in the Germanic home lands of Scandinavia and central Germany, and are of course till spoken there today. We will discuss a diverse archive of post-1989 literature, film, and memorials in order to reexamine the so-called Peaceful Revolution and the interval year of ’89-90. This page provides an overview of our course offerings for all three terms, to help students as they make … Besides the obvious answer, German, there are at least 47 living Germanic languages around today. The Germanic languages include some 58 (SIL estimate) languages and dialects that originated in Europe; this language family is a part of the Indo-European language family. GER 473. The standard division of Germanic is into three branches. Scholars often divide the Germanic languages into three groups: West Germanic, including English, German, and Netherlandic ( Dutch ); North Germanic, including Danish, Swedish, Icelandic, Norwegian, and Faroese; and East Germanic, now extinct, comprising only Gothic and the languages of the Vandals, Burgundians, and a few other tribes. Other articles where Proto-Germanic language is discussed: Indo-European languages: Changes in morphology: Proto-Germanic had only six cases, the functions of ablative (place from which) and locative (place in which) being taken over by constructions of preposition plus the dative case. Noun 1. The Germanic languages are a branch of Indo-European languages. …Indo-European is through the ancient Germanic language group, two branches of which, the North Germanic and the West Germanic, were destined to make contributions to the English language. The family also includes other High and Low German languages including Afrikaans, Yiddish and Luxembourgish, and Frisian and Scots. North Germanic languages are sometimes referred to as the Nordic languages due to their main geographic distribution. Most linguists talk about this language family in terms of three branches: the Northern, Eastern and Western Germanic languages. Word order that includes putting the verb second. The Germanic languages include some 58 (SIL estimate) languages and dialects that originated in Europe; this language family is a part of the Indo-European language family. In Modern English these are reduced to two cases in nouns, a general case that does duty… What makes English like the other languages in its subfamily? Germanic language - a branch of the Indo-European family of languages; members that are spoken … Standard German is the official language of Germany. Characteristics. Protest Memory: Post-1989 Literature, Film, and Theory. Each subfamily in this list contains subgroups and individual languages. Course Description for GER 465. Definition of Germanic (Entry 2 of 2) : a branch of the Indo-European language family containing English, German, Dutch, Afrikaans, Frisian, the Scandinavian languages, and Gothic — see Indo-European Languages Table Examples of Germanic in a Sentence Adjective Germanic languages, such as German, English, Dutch, and the Scandinavian languages. Norse is another name for the North Germanic, or Scandinavian group of languages. This means that it belongs to an early grouping of Indo-European which distinguishes itself from other languages of this family by having undergone a series of changes to consonants in initial position. German (Deutsch, pronounced ()) is a West Germanic language that is mainly spoken in Central Europe. The Germanic Languages and Literatures Colloquium is a periodic meeting of graduate students and faculty to discuss a short literary text chosen by graduate students. A total population of approximately 20 million people speaks these languages. Dialects. English is a Germanic language as are German, Dutch, Flemish, Afrikaans, Swedish, Norwegian, Danish, Faroese and Icelandic. Like every language spoken over a large geographical area, Proto-Germanic presumably consisted of dialects that eventually developed into separate languages. Germanic language synonyms, Germanic language pronunciation, Germanic language translation, English dictionary definition of Germanic language. (1979), languages with more than 3 million speakers, https://en.wikipedia.org/w/index.php?title=List_of_Germanic_languages&oldid=980471434, Creative Commons Attribution-ShareAlike License, This page was last edited on 26 September 2020, at 18:28. Navigate parenthood with the help of the Raising Curious Learners podcast. It is a West Germanic language that is also the most commonly spoken first language in the European Union. Author of \"Ontstaan en vroegste ontwikkeling van het Nederlandse taalandschap\" in. References. Germanic languages, branch of the Indo-European language family. The Germanic family itself has subgroups; English is in the West Germanic branch along with German, Dutch, Afrikaans, and a few others. The Germanic branch is one of the ten or so Indo-European subfamilies. The Germanic languages today are conventionally divided into three linguistic groups: East Germanic, North Germanic, and West Germanic. The Department of Germanic Languages offers an array of courses in languages, literatures, and cultures. German belongs to the West Germanic group of the Indo-European language family, along with English, Frisian, and Dutch (Netherlandic, Flemish). Over 95% of the population of Germany speaks the language. In all Germanic languages, you will notice that a … of or relating to the language of Germans. Be on the lookout for your Britannica newsletter to get trusted stories delivered right to your inbox. The graduate program offers Master of Arts and PhD degrees.\n\nBohemian Rhapsody Piano Notes, Igcse Syllabus For Grade 8 Chemistry, Gibson Firebird Zero, Protocol Buffers Javascript, Bonsai San Francisco, Plant Identifier Uk, Social Work Research: Definition,\n\nSpeak Your Mind", "pred_label": "__label__1", "pred_score_pos": 0.9997390508651733} {"content": "Penalty for Speeding and DUI charges\n\nPenalty for Speeding and DUI charges\n\nQuestion:  I was pulled over the other night and now I have speeding and DUI charges.  I was pulled over on 405 in Van Nuys by the California Highway Patrol.  It was about 2 am in the morning when I was pulled over.  I pulled over right away and was cooperative with the officer that pulled me over.\n\nWhat is penalty for these charges?  I know on some tickets they can just be paid but not sure if this one can be.  Do I have to go to court on this one?  The officer said I did, but not sure if what he told me is accurate.\n\nAnswer:  There are too many questions I have about your case before I can answer it.  I will address your questions to an extent, but this is something we should discuss further so I can give a more specific assessment of your case.\n\nIn regards to penalty, is this a 1st DUI, 2nd DUI, 3rd DUI…?  I assume it is a first offense DUI based on your inquiry, but would need clarification on that.  Additionally, are you on probation for anything?\n\nIn regards to the speeding charge, how fast did they say you were going? If you are convicted of going 30 mph over the speed limit and convicted of a DUI (at the same time), there is an enhancement that would add mandatory jail time on top of any penalty for the DUI alone.\n\nAs far as going to court, misdemeanor and felony charges have required court appearances.  On most misdemeanor charges, a privately retained attorney such as myself can appear at court representing you without you needing to attend court based on PC 977 authority.\n\n\nCall me at 818-336-1384 to discuss your situation further.  I have handled many DUI cases in Van Nuys with very good results and would be happy to represent you in defending your case.\n\nI look forward to speaking to you about this case.\n\nPhil Hache,\n\nCriminal Defense & DUI Attorney", "pred_label": "__label__1", "pred_score_pos": 0.9238216876983643} {"content": "Who should you donate your N95 masks to?\n\nWhen the current pandemic began, it became evident that the world was not ready. It was glaring that the world isn’t prepared for this kind of world-scale event. Many nations were caught off guard which made them suffer some setbacks before they could find their bearing.\n\nThe destructive effects of the virus have made the government and agencies to come up with regulations that will help to curtail the spread of the virus. As part of the regulations, the public is advised to put on their masks whenever they are out in the public and are going to places where the observation of physical or social distancing might be impossible.\n\nThis has made different people and countries to ensure the availability of face masks for use among their citizens. Early on in the crisis, countries depend on China for their face masks supply which is limited and insufficient to meet the high number of face masks being demanded. This made these countries look inward to motivate their domestic companies to boost up their production capacities to meet up with the demand from their citizens.\n\nNonetheless, it wasn’t too long before each country discovered that there is so much to do if they will be able to meet up with the daily demand of their citizens, especially health workers. It is good to note that among the types of face masks produced to protect against the virus, N95 masks are one of the most sought. This is because the mask can protect against at least 95 percent of small particles of bacteria, viruses, and other contaminants.\n\nDue to this high quality of the mask, the majority of people tend to go for it which makes the United States Center for Disease Control and Prevention advise that these masks should be reserved for medical professionals, emergency first responders, and other frontline workers.\n\nEven at this, the available N95 masks are not sufficient for use by the health workers. This has made medical authorities to adapt N95 masks that were originally designed to be used in Industrial settings for healthcare environments and hospital settings. This is because healthcare personnel who interact closely with coronavirus victims need an adequate and constant supply of N95 masks.\n\nFor healthcare workers, the N95 mask is a worthy line of defense against the deadly virus. It is one of the effective ways these professionals protect themselves as they attend to their patients daily. But these masks are clearly in short supply which calls for assistance and donations to help with the supply deficit.\n\nWhy N95 masks are in short supply\n\nOne of the reasons why these masks are in short supply globally and in the United States is because up till now there is still a dependence on external countries. The truth is depending on imports from other countries isn’t safe or wise. These countries also need these masks to meet their internal supply and may decide to stop exportation whenever they choose to because any sane country will choose itself over another at every opportunity.\n\nSimilarly, because of the progression in the coronavirus pandemic, some countries are shutting their borders to prevent the further spread of the virus. Most countries are doing all they can to protect their citizens and preserve their limited resources. This further impedes the proper exportation processes and consequentially impacts the importation of the highly sought N95 masks.\n\nAnother reason is that major mask producing companies in the United States have branches outside the country that are producing millions of N95 face masks but since these branches are located outside the country, their supplies are also considered as an import and are subjected to the factors that affect other importations as well.\n\nThere is also the problem of reliance on the global supply chain where these facemasks are allocated based on some factors including the documented number of cases and nominal face value, etc. This dependence on the general pool is affecting the domestic focus on internal production.\n\nSimilarly, there is a mentality where the country assumes that it possesses the capacity to produce whenever it is needed which affects the country’s mentality towards saving for future purpose. Again, the machines used in the production of these N95 masks are now very expensive as well as the material used.\n\nThis calls for assistance and donations from different corners, but you need to make sure you giving out your donation to the right set of people, the set of individuals that are most in need.\n\nWho then should you donate to?\n\nThe N95 masks are in high demand globally and calls are being made for donations to be made to fill in the space left by importation and domestic production. There are groups of people that are in dire need of these masks and whom donations will help in so many ways.\n\nIn order of priority, the healthcare workers, emergency first-line responders such as doctors, nurses, and other paramedics are at the forefront of the battle. These people need a constant supply of N95 masks to protect themselves from the deadly virus. It is only when their lives are secured that healthcare can be delivered. To protect the public, you need to protect those who are caring for the lives of the public.\n\nSome of these healthcare professionals work in hospitals, special medical centers, intensive care units, community clinics, and are trying their best to provide the necessary health care. You can give your donations to their regulating association such as the American Health Organisations, Community Health Centers, and the Association of Primary Health practitioners.\n\nAlso among this group of workers who need your donations are psychologists, pathologists, laboratory scientists, occupational therapists, and other essential healthcare workers with essential medical services. There are also other workers whose jobs are essential to the efficiency of the service of health workers. These include pharmacists, researchers, Home caregivers, etc.\n\nThese workers must be provided with the necessary personal protective equipment to maintain the sanctity of the protective chain. Also, some workers are in charge of emergency services such as workers who work at the police departments, fire stations, county sheriff’s offices, and public works departments. \n\nAfter health care and related workers are security agents both state and federal as well as the privately-owned security institutions. It is good to donate to these workers to be able to protect themselves as they go on to protect the lives of others.\n\nAlso, in the group of essential workers who need your donations are assistants and technicians who are helping these professionals in the performance of their duty. It is good to note that protecting each of these workers goes a long way in helping these professionals.\n\n\nIt is important to note that the government and different agencies are trying their best to make sure that the N95 masks go around. Nonetheless, business organizations, wealthy companies, and philanthropists should also offer their support. There is so much to be done and every hand must be on deck to make sure that this coronavirus menace comes to a halt globally.\n\nFor those who are unsure how they can go about their donations and where they can try to contact the American Hospital Association (AHA) to learn more about how they can be of help. Try and make your donations today.\n\nFeatured products\n\nBest Selling\nSale price$149.95\nBest Selling\nSale price$127.95\nBest Selling\n3M 8210 mask | N95 mask x 20 | NIOSH 503 reviews\nSale price$129.95", "pred_label": "__label__1", "pred_score_pos": 0.5147606730461121} {"content": "null null\nPD 150 shooting guide\nThis guide is intended to be a useful reminder of the operation and functions of the Sony PD 150. Use it as a general\nrefresher if you haven’t been out filming for a while, or refer directly to the relevant sections for guidance and help on\nspecific subjects. There are three main sections. This, the first section, will take you on a tour of the camera and guide you\nthrough its basic operation. The second section deals with picture functions on the PD 150 and lighting, and the third\nsection is a guide to recording audio successfully. References to camera left and right are looking at the rear of the camera.\nText in BOLD is the additional information if you’re used to the VX 2000.\nSafety; both your own and other people’s is a very important consideration when you are filming on DV. To go out filming on\nDV you must have completed suitable relevant safety training. A risk assessment should be completed prior to every shoot.\nPotential hazards must be identified and dealt with in advance of your shoot. Forward planning and thought about what you\nare going to do on the shoot is crucial - think carefully about the environment and circumstances you will be filming in. If you\nare filming in public places be aware of the dangers of people tripping over cables, your tripod and your kit bag. Children are\nof course particularly unpredictable.\nThe small size and flexibility of a small DV camera can make it tempting to try things that you otherwise would think too\ndangerous. Don’t film from unguarded roofs, or other high places, be careful near water and moving traffic. It’s yours and\nother people’s safety you are putting at risk.\nIf there are two or more of you on the shoot, divide responsibilities up sensibly between you. If you are operating alone, go\nto the next section, as there are implications for the type of filming it is safe for you to do.\nThink about the handling and transportation of your kit and don’t overload yourself. Handheld filming is tiring so make sure\nyou take breaks, or put the camera on a tripod for periods.\nThere should be at least two of you on the shoot before you can contemplate using mains supply lights. You must be able to\nprove you can use mains lighting safely. You should not use any mains socket without using a socket tester. Provided your\nbattery charger has been electrically tested and has a sticker to prove it, you can plug it directly into the mains. All other\nmains equipment and untested chargers should be plugged into the mains via a residual current device or RCD, to avoid\nshock. Refer to the lighting section of this guide for detailed information about using lights on a DV shoot.\nAlways make sure that someone at base knows where you are, and that you are contactable on location - ideally by mobile\n‘phone. Equally you need to know that there is someone at base that you can call if you need to. If circumstances change\nwhile you are out filming, make sure you inform your producer before undertaking anything potentially hazardous that you\ndid not previously anticipate.\nIf you have any safety concerns about your shoot, raise them with your producer, so that you can make sure you are\nequipped properly and can film safely.\nCheck for local guidance on lone working. Working alone means that your awareness; both physical and mental is severely\nreduced, so you must be sensible about what you can achieve by yourself. Because of the potential hazards and problems\nthere are restrictions on what you should do when out filming solo.\nFirstly keep your shoot to static general views, and simple pieces to camera or interviews only. You must not operate any\nmains lighting kit, and you should restrict yourself to basic sound set-ups.\nNever track backwards whilst filming on your own - don’t do it unless someone can guide you.\nWhile you are filming your eye is at a viewfinder, you are wearing headphones and you are concentrating on what you are\nfilming. So think carefully about your surroundings, and make sure you are in as controlled an environment as possible perhaps an office or a house. Don’t contemplate filming in unpredictable surroundings like very busy public areas or near\nmoving vehicles, and avoid locations where your reduced awareness could cause you, or anyone else to have an accident.\nPD 150 shooting guide\nBear in mind that you or your camera could attract unwarranted attention - DV cameras are worth money, and you are a\nmember of the dreaded media.\nThis guide starts with a tour of the PD 150, and a reminder of how to get the camera up and running. Refer to the index if\nyou are interested in a specific subject.\nFor more detailed information on recording pictures and audio successfully you should refer to the picture and lighting\nsection and the audio section of the guide.\nThe PD 150 can take different battery sizes, from a lightweight one-hour capacity, to a heavier six-hour version. The arrow\non top of the battery indicates which end goes in downwards. Slide the battery into the slot at the back of the camera until it\nclicks. To release, press the catch at the top of the battery compartment. If they’re old or you’re using them in extreme\ntemperatures they won’t last as long as usual.\nIf you need to power the camera from the mains, remember that if your power supply and lead has been electrically tested\nand has stickers to prove it, you can plug it directly in. If it has not been tested you MUST plug into the mains via an RCD,\nwhich prevents any risk of shock. Look at the back of the camera and peel up the rubber cover at the lower left to reveal the\nDC in socket. Plug the power supply lead in here.\nYou can use any mini-DV or small DV Cam tape in the PD 150. The camera can record in either the DV or the\nDVCam format, so the length of tape will depend on this. You’ll get about 64 minutes in DV, or 43 minutes in DV\nCam. If you use a different branded tape than the camera mode, you will not get the length indicated on the tape\nbox. The choice of format is up to you, but with DV Cam you get reliable (but fiddly to use) timecode and in theory\na more durable recording. However, many people are happy with the simplicity and low cost of the DV format, so\nconsider this option for your programme.\nTo insert a blank tape, press down the ‘eject’ button to the left of the cassette compartment at the camera right hand side,\nand after it has fully opened insert the tape - with the writing on the tape facing outwards and downwards. Gently push the\ninner cassette housing in, and then the outer door where indicated, until it clicks shut. It needs a good push to click shut.\nTo prepare to record, look at the back of the camera, press the little green button, and rotate the power switch to ‘camera’.\nJust in front of the main switch is a little black slider switch. Make sure it’s towards you, to stop the power switch going into\n‘memory mode’. The camera is now ready to record. To record press the red button, and to stop press it again. The front\nred light will light when recording unless it has been disabled in the ‘others’ section of the camera menu.\nIf the camera is on standby for a few minutes it will switch off just the motor, to preserve battery power and reduce\nwear. This is different from previous handycam machines that switched off the whole camera. This means it will\ntake a little longer to start recording as the motor starts up again, if you’ve not done any recording for over five\nminutes or so.\nWhen you press record allow a few seconds run up time before beginning interviews etc.\nThe PD 150 has the feature of a colour flip-out screen as well as an LCD black and white viewfinder and you can use\neither to monitor your recordings. The viewfinder does not show more detail or make it easier to focus. It should be\nused in bright conditions when the screen is washed out, but of course you won’t be able to monitor colour issues. A hood\ncan be bought to shield the screen if it’s sunny. The screen has brightness buttons at the lower left. Press these to ensure\nPD 150 shooting guide\nthe setting is in the middle. The screen tends to give more ‘burnt out’ pictures than recorded on tape. Use of the screen for\nassessing exposure is not recommended. The viewfinder is slightly better in this respect.\nIn this guide when we talk about information displayed on the screen, you’ll see the same information if you choose to use\nthe viewfinder instead. The screen can be rotated and turned to just about any angle. You can turn the screen to face the\noperator for ‘diary’ style work, or pack it flat against the side of the camera, which is great for a boom operator. With the\nscreen in this position the viewfinder also works, but the battery life will be reduced.\nThe screen back light can be changed in the menu, which could be useful in bright filming conditions. Press the menu\nbutton, scroll down to ‘LCD VF set’ and select LCD B.L. to be normal or bright. The bright setting will use more battery\nThe PD 150s viewfinder can be focussed for your own eye - this does not affect the recorded focus. Put the lens cap on.\nPull the viewfinder back and up, look into it and adjust the lever underneath until the text is in sharp focus. The viewfinder\nbrightness can also be changed in the menu.\nDust can appear on the viewfinder glass, so before you go filming check the viewfinder and clean it if necessary. Clean the\nviewfinder glass gently using a puffer or very soft cloth.\nFlip out the screen by pressing the silver catch at the rear left of the camera. It should be showing the standard default\ndisplay. At the top left is the estimated time left on the battery. The top right has the timecode, with the remaining tape time\nunder it if you’ve got a tape in, and tells you whether you are in standby, record or photo mode. There will also be a DV or\nDVCam indication.\nNothing else should be on the display, unless you have selected a manual function. Any function information is generally\ndisplayed on the left of the screen. If you press the ‘display’ button on the left side of the camera, all the on-screen\nindications go away, just leaving ‘STBY’. However, if you’ve selected a manual function, the display stays.\nThe PD 150 uses info-lithium batteries, which allow a readout of battery life in minutes. The bars on the battery symbol on\nthe screen will reduce as the battery loses power, as well as the indicated time reducing?. Shortly before the battery fails\ncompletely a flashing battery symbol with a line through it appears in the centre of the screen. The red record light will also\nflash. Keep an eye on battery strength during filming. If there is only one bar left in the battery display and you are about to\nstart filming an interview or long piece, change the battery before you start.\nThe estimated battery life in minutes should be treated with caution. If the battery was last used on a non info-lithium\ncamera, the indicator may well be wrong. However once you’ve run it flat on your camera at least once, the reading will be\naccurate the next time.\nThere is a little slider on the back of the battery with a little green stripe showing if the battery is charged. However it is very\neasy to knock this by accident, so its far better to keep charged batteries separate from uncharged in your kit.\nInfo lithium batteries do not need to be fully discharged before they are recharged. There are several chargers on the\nmarket, so their operation can vary slightly, and the time taken will depend on the size of the battery. The smallest will take\njust over an hour; the largest may take six hours. Generally though, plug the charger through an RCD and into the mains.\nLine up the arrow on the battery with the corresponding arrow on the charger and slide into place. The charge light should\nlight up and will go out when the battery is fully charged. It is also possible to charge a battery on the camera, by connecting\nthe mains adapter with the camera power off.\nA flashing tape symbol will appear when you are 5 minutes from the end of a tape. It will also appear if you have no tape in\nthe camera, or if the tape has its record tab pulled across.\nPD 150 shooting guide\nWhen you have removed a tape and have finished recording on it, make sure you slide the tab to ‘save’ so that there is no\ndanger of your material being recorded over, and don’t forget to label it up. It’s best not to eject tapes unless you’re at the\nbeginning or end of your recording, as damage can sometimes occur during the eject process. Don’t eject tapes in windy or\ndusty conditions.\nIt is not a good idea to routinely review tapes in camera mainly due to the danger of recording over your material, timecode\ndiscontinuity, and a very minor potential for tape damage. However if you need to check something you have recorded you\ncan use the camera as a player. At the back of the camera, turn the lever to VTR. All the usual player functions will appear\non top of the camera, and you can rewind, play, fast forward, etc.\nIf you have reviewed your tape, you need to cue up at the end of your last recording. Switch back from VTR to camera\nmode. On the top of the camera, under the handle, there is an end search button. Press it and the PD 150 will search for\nthe end of your recording, play back the last five seconds, and then sit at the end of your last recording, ready to record.\nNote that if you have ejected your tape, the end search function will not work. If you don’t use end search, you may get a\ntimecode discontinuity depending on the timecode menu settings.\nFor logging, it’s best to get a VHS transfer done and log from that to avoid wear on the camera.\nPlayback through a television is difficult to generalise about, because of the specifics of TV and video set ups and plugging.\nHowever we’ll try.\nPeel down the rubber cover towards the front of the camera to reveal the video and audio out phono sockets, coloured\nyellow, white and red. Plug in the leads, and look for the input sockets on your viewing facility, often marked ‘line in’ or ‘AV’.\nThey are most likely to either be phono sockets like those on the camera, or a SCART socket which is long and thin with two\nrows of tiny input sockets. If the input is a SCART socket you need to put an adapter on your phono leads.\nIt doesn’t matter whether you plug directly into the TV or via the video recorder, but one may be easier to locate than the\nother, or one may be phono sockets while the other is a SCART. On domestic TV’s and video recorders the ‘line in’ sockets\nare hopefully under a flap at the front, or less usefully they’ll be on the back.\nOnce you have plugged in, you need to select the correct channel to view. If you’ve plugged the camera into the video\nrecorder, turn the video recorder on and select the line in, AV or external channel. Then select the video channel on the\ntelevision, often the AV channel. If you’ve plugged directly into the television you need to select the input channel which is\noften a button on the remote with a symbol of a TV screen with an arrow going into it. You should now get picture and\nThe PD 150 can record from an external video input. This can be useful if you need quality off–air recordings, recordings\nfrom external cameras, or from video games. Find the audio and video phono sockets, under the rubber cover on the right\nhand side of the camera. Plug in lead supplied with the camera, and connect the external source to the phono plugs at the\nother end of the lead. Note that the mic socket is disabled, so sound has to be input through this lead also. You may need\nadapters to suit the sockets on the external source. There is also an S-video socket which will result in better quality\nrecordings, but you’ll need an S-video lead that isn’t standard in the kit.\nTo record in this way you don’t use the red record button. Instead put the camera into VTR mode and use the record button\non the player panel on top of the camera.\nPD 150 shooting guide\nAudio is dealt with in detail in the third section of this guide. The PD 150 comes with its own microphone which is normally\nfitted on the camera, however it’s not brilliant quality and is usually too far from the sound, so other solutions are described\nThe PD 150 can be operated fully automatically, or you can override some or all of its auto functions and elect to control\nthem manually. The most important function to control manually is focus; the other automatic functions can be adequate in\nmany situations. Using the camera like this is great for quick and easy shooting.\nTo select this mode, look at the upper back left of the camera where you will see a silver three-position switch. Move it to\nthe ‘autolock’ position. This sets exposure, white balance, and shutter speed to auto. Focus is controlled on the lens, and\naudio level is set separately. How to use the camera effectively in auto sound level is described in the ‘audio’ section later.\nThe PD 150 has a large selection of menu settings that control aspects of the camera’s operation and picture\nThe menu options for the PD 150 are accessed via the menu button on the camera left side under where the screen\nfolds in. Press ‘menu’ and then use the wheel at the back to scroll through the menu. Press the wheel in if you\nwant to enter one of the menu options, then use the wheel to highlight your chosen menu option, and press it in to\nselect. Press menu again to leave.\nSome menu functions are essential to correct operation, and must be checked before use of the camera. The most\nimportant sections are timecode, camera set and tape set.\nIf you’ve set the camera in DV mode, the timecode functions are greyed out, and the timecode behaves as a normal\nDV camera, i.e. it starts at 00 00 00 00, and counts up. If you’re in DV Cam mode, you can play around with the\nThe timecode should normally be set for rec run, and preset rather than regen, with the preset value at 01 00 00 00.\nYou can use the second digit for roll numbering, so roll two would start at 02 00 00 00. You have to set this for\neach new tape. If you review a recording, switch the timecode make setting to regen. The other timecode features\ncan be useful if you want to sync two cameras together. In this case select ‘free run’, and enter the time of day,\nfinally setting both cameras’ timecode running at the same time by pressing buttons simultaneously. You’ll be\nwithin a couple of frames, and will make your editors life much easier. The camera can’t be accurately locked to an\nexternal source as there’s no socket for timecode. User bit is a part of the time code which can also display time of\nday, or other information relevant to your production.\nIn ‘camera set’, the ‘wind’ setting should normally be ‘off’ for both channels unless you want bass cut on your\nThe tape set menu has audio functions that allow switching between auto and manual level, and whether the\nsoundtracks are ganged or separate. We’ll look at these later.\nThe PD 150 also has a ‘Custom Preset’ facility, accessed through a button at the back of the handle. Press this in and you’ll\nsee the settings on the screen. Normally the ‘set’ item should be off, making sure the picture parameters are at their default\nsettings. The PD 150 instruction manual gives full details of what the settings do, but normally the only ones worth changing\nare the sharpness and the AE shift. If Custom Preset is on, ‘CP’ will appear on the screen.\nPD 150 shooting guide\nThis section of the guide will look at the functions on the PD 150 that will help you to record pictures successfully. Refer to\nthe index on the cover if you are interested in a specific subject.\nFor information about recording audio successfully refer to the audio section of the guide.\nThe PD 150 has automatic settings for its picture functions like focus, exposure and white balance, some of which are very\ngood in many circumstances, but we do not recommend using the camera fully automatically. Focus should normally be\noperated manually; in auto focus the PD 150 tends to hunt for new focus points while you are filming, producing amateur\nlooking pictures that you cannot correct in post production.\nThe decision about which other functions to operate manually and which to leave in automatic mode is not easy to answer\nas it depends on your level of experience, the complexity of the shoot and the location you are filming in. Basically be\nsensible; if you are filming on your own, or under pressure then you will almost certainly get better results leaving some\nfunctions on their automatic settings than trying to control everything manually. This does not however imply that you should\nnever use the other manual picture functions. Again be sensible, you could leave them automatic until you find yourself in a\nparticular situation where manual is better, for example when your subject is in front of a bright window.\nOn the left hand side at the top rear is a three-position switch. The top position, ‘autolock’ sets exposure, white balance and\nshutter speed all to auto. This means that they will be set and changed by the camera as it reacts to what it sees. The\nmiddle position allows manual control of these functions. You can select the manual function you want to control and set\nyour own level. Operation of each is detailed in the next section.\nFocus and sound level, however are controlled separately, and are not affected by the ‘auto lock’ switch.\nOnce you have set your manual picture functions you can hold those settings by switching to ‘hold’. You’ll need to switch\nback to the middle position to access these manual controls again. The camera remembers your manual settings, so you\ncan switch between the two modes without worrying.\nFocus on the PD 150 is controlled independently of all other camera controls using the focus wheel behind the lens and the\nsliding switch on the side of the camera which has three positions; auto, manual and infinity. Below is the push auto button\nthat enables you to make use of the camera’s auto focussing, while remaining in manual mode.\nWhat follows are three tried and tested methods of focussing, each of which should produce good results in different\ncircumstances. Shots can sometimes go out of focus through a zoom, so for guaranteed good results zooms are generally\nbest avoided.\nA quick & easy method for interviews, vox. pops etc. is to select manual focus, frame the shot and then tilt down to the\nperson’s chest area. This avoids any possibility of the camera focussing on the background. Press the push auto button and\nhold it for three seconds. Let go and return to your desired framing. Do not zoom or move whilst doing this.\nAn all purpose focus technique for handheld filming relies on you going fully wide on the zoom and staying wide throughout.\nPoint the camera at a sharp object about a metre away, select manual focus and press ‘push auto’ for 3 seconds. Provided\nyou are in reasonable light conditions everything between half a metre and 10 metres will be in focus, but you must not use\nthe zoom.\nPD 150 shooting guide\nTo hold focus while filming actuality and you or your subject is moving, hold your finger on push auto for the duration of the\nmovement and then let go when things settle down again. You could also try this while zooming.\nManual focussing using the focus wheel is of course perfectly possible, but it is not easy to get good results on the PD 150\nbecause of the poor resolution of the viewfinder or screen, and the sensitivity of the focus ring. Only use this method if you\nhave plenty of time to fiddle. The wheel has a ‘linear’ action, so it is possible to repeat a pull focus if you’re careful. If you\nare using the viewfinder, remember to make sure that it is sharply in focus to maximise your chances of success.\nBeing in autofocus all the time is not recommended because as soon as there is any movement in frame, such as a\ncontributor leaning slightly, the camera might try to adjust its focus, producing a soft image as it does so. Use the camera in\nmanual with the ‘push auto’ button as described earlier.\nYou can focus on infinity when in manual focus by sliding the focus switch down to infinity. This really only applies to\ndistances of over 30 metres.\nWhite balance is something that you should think about whenever the light changes. Differences between daylight and\nartificial light sources are magnified by cameras, and can produce a strong colour caste on your pictures if you don’t white\nbalance when you should.\nThe PD 150 will auto white balance your pictures, or you can use the three manual options. They are all controlled from the\nback of the camera. Make sure the three position ‘auto lock’ switch is in the middle - the unmarked position.\nOn the rear of the camera, is a column of black buttons. The white balance button is the second one up. Pressing this will\ntake you out of auto white balance, and give a symbol display on the screen. You can use the wheel below the buttons to go\nthrough the camera’s white balance options - manual, daylight, and artificial. The symbols that appear on the screen are: a\nsquare and two triangles for manual; a sun for sunlight; and a light bulb for artificial.\nAuto white balance is selected in ‘auto lock’, or by pressing the white balance button to remove any white balance\ninformation from the screen. The camera’s auto white balance mode will give adequate results in many situations, but it may\nnot fully colour correct. It is also slow to adjust to changes in lighting conditions, so you need to wait 15 seconds for the\ncamera to stabilise before you resume filming. Sometimes it doesn’t work at all, in which case switch the camera off and on\nagain to reset.\nThe PD 150 has white balance pre-sets for daylight & artificial light, but these are often unreliable and are best avoided,\nexcept perhaps as an effect to enhance the quality of a light source. For example you could select the daylight setting to\nenhance a sunset and the artificial setting to enhance candlelight. Press the white balance button and rotate the wheel until\nyou see the sun symbol for daylight and the light bulb symbol for artificial light.\nManual white balance will always give the most accurate results, as it sets true white in a given situation. It can be\nparticularly important in mixed lighting conditions of daylight and artificial light combined, and even more so if there are\nfluorescent lights. Their colours vary wildly and may be too much for the auto white balance to cope with. To be of any use\nPD 150 shooting guide\nyou must do your white balance in the specific place you are filming in - this is particularly important in locations with mixed\nlight where the mix of light may be totally different in one corner of the room to another.\nMake sure you’re in auto exposure. Press the white balance button (if there’s no white balance information on the screen)\nand rotate the wheel until you get the square and two triangles symbol. Point the camera at a piece of white paper in front of\nthe subject you are going to film, and move or zoom in to fill the frame. Press the wheel in, and the symbol in the screen\nwill flash rapidly while the camera sets the white balance. Once it’s stopped flashing, your white balance is set.\nIf you are handheld and moving between different lighting situations you may be better to stay in auto white balance mode\nwhere the camera will at least make some adjustments as you move around.\nExposure control is the process by which the camera is adjusted to produce as natural a picture as possible. If you are\nfilming people, the aim is to expose correctly for the face.\nExposure on the PD 150 is affected by the iris, gain, and shutter speed controls.\nThe size of the iris affects the amount of light entering the camera and is measured in F numbers. At F11 the iris is\nclosed right down in response to very bright light, at F2 the iris is almost fully open in response to lower light. If\nthe iris is fully open and there is still insufficient light for a correct exposure, gain, measured in dBs can be added\nto electronically amplify the video signal. Gain will increase the graininess of your image slightly, so it’s not a\ngood idea to use more than about 12 dBs of gain for quality pictures. Gain will go up to 18 dBs which may be\nnecessary in low light, but be aware that your image will be slightly more grainy. Shutter speed also affects\nexposure, with a slow speed being very sensitive to light, and a fast speed being insensitive. There is a ‘normal’\nspeed for video use, which is a fiftieth of a second, and should be selected unless there is a good reason not to.\nEach of the three controls can either be set to auto or manual, giving a number of different combinations. We\nrecommend setting the shutter speed manually to 50, and the gain to OdB as a starting point for operating the PD\n150 in manual exposure. If there’s no indication of shutter speed on the screen, the shutter is in full auto, and will\nfight against any iris or gain adjustments. Unlike previous cameras, the PD 150 will remember any settings made\nindefinitely, even if a battery is off the camera for an extended period.\nYou know when you’re in auto exposure if there are no F-numbers, dBs or shutter speeds displayed on the screen.\nIn this mode the camera looks at the average brightness of the whole scene and then adjusts itself accordingly.\nWhile useful for shots with fairly balanced light throughout, auto exposure will not be effective in any situation\nwhere there are areas of heavy darkness or strong light, such as the light from a window. Unless you change your\nshot to eliminate the extreme light area, you will need to manually adjust the exposure for your key subject or\nobjects to ensure that they are exposed correctly.\nPressing the iris button on the side of the camera activates manual iris. A vertical bar will appear in the top left side\nof the screen along with your current F-number. Using the wheel beside the iris button, you can adjust the iris. It\ncan be difficult to be sure that you have set the exposure correctly by simply looking at the PD 150 screen. The\nviewfinder is slightly better, but if you are in any doubt, it is far better to slightly underexpose than over.\nPD 150 shooting guide\nSemi-automatic iris can be a useful technique if you are filming somewhere with problem areas of light or dark that\nyou cannot eliminate from the shot. While in auto-iris, show the camera the area you want to expose by zooming\nin, but with any problem areas like bright windows excluded from the shot. Press the iris button in order to switch\nto manual iris. Check the F-number. If it is showing F2.4 or below then you need to press the gain button twice.\nYou should now have a ‘dB’ reading on the screen. Hold the camera pointed at your area of interest whilst doing\nall this. Zoom back out to your original framing. The exposure is now set for the scene minus the extreme light or\ndark areas. The exposure will not change if you now include the light or dark area in your shot as it has been set\nto a fixed manual value.\nIf your scene includes a person your priority is to expose for the person’s face, rather than the scene as a whole.\nOne of the first effects of over exposure is detail disappearing in light areas, so manually set the exposure for the\nlightest side of the face. Move the zebra switch (under the LCD screen) to ‘70’. This gives you a stripy pattern on\nareas of the picture that are 70% exposed. This pattern only appears in the screen or viewfinder, and is not\nrecorded on tape. Adjust the iris (or gain if you don’t have enough light) to get the pattern on facial skin tone. The\nbrighter parts of the face should now be stripy. The 70% zebra is calibrated for average Caucasian skin, so using\nthis for either very light or dark skin will result in under or over exposed results. Once you have set the exposure\nusing the above method, make the shot slightly darker for dark skin (using the iris) and slightly lighter (using gain\nor iris) for very light skin.\nThink of the Neutral Density or ND filters as the camera’s sunglasses, which should be used in bright conditions. They are\nin-built filters that cut down light into the camera. If you are in auto lock, or auto iris, ‘ND 1’, ‘ND 2’ or ‘ND off’ will flash on\nthe screen if the camera thinks it’s got the wrong filter selected. Follow the instruction, and the ND indication will stop\nflashing. You will get better quality however if you check the iris setting before making a decision about the ND’s. If the iris is\nat F9.6 or 11, you should put on the next level of ND, or if it is showing OPEN, go down a level. If you just follow the camera\ninstructions, you may get a ‘strobey’ picture as the camera puts in up to a 150 second shutter before warning you about the\nND’s. This is the case only if you have ‘auto shutter’ selected in the menu. If auto shutter is off, and you forget to put in the\nND, the pictures will look out of focus. We recommend auto shutter on, and for you to check the iris setting as above for\neach new set up.\nBe aware that switching the ND filter in or out causes a sudden change in exposure, and a visible wipe across the picture.\nSo if you are following a contributor and the camera advises you to switch the ND filter off or on, you would be better to\nignore the instruction until you reach a cut point in your filming.\nIf you are fully zoomed out, and in bright conditions, any dirt or marks on the lens will be more visible, This is even worse\nwhen you’re using a wide-angle adapter or the anamorphic lens. A screw on ND filter can be useful to stop this happening.\nAlthough not a physical shutter that opens and closes, video cameras have an electronic shutter that in normal operation\ngathers pictures at 50 times a second.\nThis shutter rate can be varied, so that the shutter opens more or less often per second.\nFast shutter speeds need a lot of light and motion will look jerky and strobey, not smooth. If you are in very bright conditions\nand the ND filter is not sufficient you can increase the shutter speed slightly, to effectively cut down the light into the\ncamera. It can also be used to follow fast action that will be used to extract stills or slow-mo sequences. Unless a special\neffect is wanted it looks very unnatural on anything else, so use it with caution.\nOne exception to this is filming or in countries that use 60 Hertz lighting, such as the USA. The 1/60 second shutter speed\nshould be used to eliminate flicker when you’re shooting under these conditions.\nPD 150 shooting guide\nTo remove flicker from computer monitors, make sure you have ‘auto shutter on’ selected in the menu. Set up a light near\nthe monitor, pointing at the camera. Vary the amount of light by panning or zooming until the flickering disappears. At this\nmoment, press the shutter speed button to 'lock' the auto shutter. It will give a readout of the nearest shutter speed, but is in\nfact set to a precise speed to match the monitor. Now remove the light and adjust the iris for a normal exposure.\nA slow shutter speed of a third of a second is another way to capture pictures from a computer screen with minimum flicker,\nbut there shouldn’t be anything moving in the shot. It can also be used to give a really blurry effect to shots.\nMake sure the auto shutter is on in the menu. If this is not done, the pictures can look very ‘soft’ in bright conditions. This\nprotects you if you’ve not followed the ND instructions, or if you’d like to move from indoors to out without seeing the ND\nkick in. The auto shutter only works if the light is too bright, you’re in auto exposure, and if the iris is being asked to close\nmore than F9.6.\nTo access the variable shutter speeds on the PD 150 make sure the autolock button is set to the middle position. Press the\nshutter speed button at the rear of the camera. Use the control wheel to change the shutter speed. For the slow shutter\nspeeds, put an ND filter on, even if you’re indoors, and do your focussing before switching the shutter on.\nThe PD 150 has a much-improved system for grabbing stills, called ‘progressive scan’. This maintains full resolution and\navoids the need to ‘de-interlace’ in computer software. You can record on tape, or onto a memory stick. Use whatever\nsystem is compatible with your computer.\nIt may be a useful emergency facility for publicity stills on shoots where a photographer cannot be present, however the\nquality is not comparable to a camera using film.\nTo get the best quality, select ‘progressive scan’ in the menu.\nIf you’re recording stills onto tape, just press the photo button behind the zoom lever half way down to grab a still picture,\nthen all the way down to record 7 seconds on to the tape\nIf you’re on the memory stick, you have to go into ‘memory mode’. There is a tiny switch on the main power control that\nstops it going into memory mode normally. Move the switch, then push the power switch to ‘memory’. Use the ‘photo’ button\nas described earlier. To return to normal recording, simply turn the switch back to standby. Refer to the PD 150 manual for\ndetailed information about memory mode.\nThe PD150 16:9 mode is considered ‘just acceptable’ for widescreen shooting, but there are ways to get better quality such\nas using a high quality ARC in post production. ARCing in a computer based post production tool is unlikely to give better\nresults than the camera 16:9 mode, so consider this before shooting.\nIf you’re shooting for a widescreen programme you may have an anamorphic lens, a graticule (guidelines on the screen)\nfitted, or preferably both.\nYou should know the ‘shoot and protect’ requirement for the programme. This is usually shoot 16:9, and protect for 14:9.\nVery simply, this means not having things at the extreme left & right that are important to the viewer. A wide 2 shot would be\na problem, as would a side shot of say a sausage dog. The analogue 14:9 viewer (still in the majority) would miss the poor\nanimals’ head & tail!\nIf you’re doing a shoot that is fairly relaxed, and you don’t need the tight end of the zoom, you’ll get great quality with the\nanamorphic lens. It’s important to make sure the lens is fitted correctly. Looking into the lens, you should see a tall, thin\noval, looking into the viewfinder/screen you should see a tall thin image. The anamorphic lens will not focus if you zoom in\nmore than two thirds of the way, so use the zoom indicator on the screen to gauge this. Also don’t use the extreme wide end\nof the zoom as this may cause darkening of the corners of the picture. Good uses for the lens would be interviews, cutaways, sequences you can control, and handheld work. You can frame full height, but watch out for extreme left & right due\nto the 14:9 protect area. Ignore the top & bottom lines on the graticule, if fitted.\nPD 150 shooting guide\nIf you’re doing a fast paced shoot, needing the full lens performance, use the graticule and NOT the anamorphic lens..\nExamples are ‘fly on the wall’, actuality, and documentaries. Frame within the graticule height, and again watch out for\nextreme left & right due to the 14:9 protect area.\nIf you mix lens and graticule on you shoot, make a note either on location or when logging as to when this happens. The\nmaterial shot with the graticule will need to be ARC’ed in post production.\nLight in a picture gives contrast; it creates dark and light, and at its simplest creates well-balanced pictures with detail where\nyou want it. Don’t think of lighting at its extreme; it is as relevant to a simple interview of one person in their kitchen as it is\non a drama shoot. Whether you are using available light only or have a truck load of hired in lights, (not very likely on a DV\nshoot), the basic aims are the same - to control contrast and light a scene to your best advantage.\nThere are established safety guidelines relating to lighting, so if you are filming on your own you must not use any mains\nsupply lighting kit. If in a team of two or more, you can use mains lighting but only if you can prove competence. Even if you\nhave the crew and the kit to light, consider its appropriateness for the shoot. Don’t forget that setting lights takes time, they\nmust be treated with care, and without experience you can cause yourself more problems than you solve. You may well get\nbetter results being creative with the available lights than trying to completely re-light the location.\nThere are principles about light, firstly defining its quality and secondly relating to its use, that apply regardless of whether\nlight is available on location or brought in, natural or artificial.\nLight falls into two categories; hard or soft. A hard light is from a small source and produces a contained area of light. It is\nfairly easy to control and will create detail and hard shadows. Soft light comes from a large source and produces a larger\nand less contained area of light. Not as easy to control, soft light tends to smooth out detail and the resulting shadows will\nbe soft.\nRegardless of the size and complexity of a shoot there is a basic methodology behind all lighting, and an understanding of\nthe three main elements will make a great difference to what you can achieve, whether with available light or a basic lighting\nThe key light is the main source of illumination. It is usually a hard light source that creates shadow and interest and reveals\ndetail. When you are lighting a contributor or interviewee the best angle for a key light is between about 30 and 45 degrees\nfrom head on. The light source should ideally be above the eye line, which will provide a natural looking catch-light for the\nThe fill light is positioned on the opposite side and controls the contrast between light and dark areas, thereby setting the\nmood of the picture. It is usually a soft light, and dimmer than the key light.\nFinally the back light separates the subject from the background, introducing depth into the picture. Back light is usually\nOn most DV shoots simple is better is likely to be the maxim, so we’ll consider some ideas about making the best of\navailable light, and then offer some advice about using a lighting kit.\nUse of just available light on location can enhance your pictures no end. When you arrive at your location look at the light\nsources available; are they hard or soft? and what would be the best position for you, with camera and your contributor to\nmake best use of the available light?\nFollowing the lighting principles explained in the previous section, a window would be the most obvious available source for\na key light. Position your contributor facing the window, not head on but at about a 30 degree angle. This will throw light\nonto the contributor’s face, give some detail otherwise known as modelling to the features and it should throw some light into\nPD 150 shooting guide\nthe contributor’s eyes. If the dark side of the face is too dark you need to reduce the contrast. This is the function of the fill\nlight, and it could be a simple reflector like a white card or Lastolite collapsible reflector. The final light, the back light, can\nfurther enhance your shot. It should be placed behind your contributor and could be a battery light. It is the least important\nof the lights if you have limited resources, but if used will create depth to the shot and help separate your contributor from\nthe background.\nOnce you are happy with the lighting, don’t forget to white balance manually if you are in mixed lighting conditions like those\nwe have described.\nLighting with overhead lights only is far from ideal, particularly if they are fluorescent. They throw light directly down onto\nthe contributor and do not provide modelling or catchlights for the eyes. You could try bouncing light back into the eyes\nusing a lastolite reflector or large piece of white card. If there are other lamps available try using them with or instead of the\noverhead light. It’s OK to ask for available lights to be switched on and off, but don’t move or touch them as it could be a\nsafety issue.\nIf you have unwanted shadows in your shot, remember that you will never eliminate them by switching on more lights. You\nwill need to reposition your contributor instead.\nWhen filming outside, your light source is likely to be the sun, even when it is overcast. Position your contributor so that the\nlight is thrown onto their face, providing modelling and catch-light. If there is too much contrast between the sides of the\nface, use a reflector.\nThe principles for setting lights are outlined in the ‘lighting principles’ section of this guide, and you should also refer to the\nprevious section on making the most of available light. Using a lighting kit instantly raises a set of safety issues that you\nmust consider - lights are potentially very dangerous.\nSafety is of paramount importance when using lights, there are many potential hazards to avoid; firstly the danger of\nelectrical shock.\nTest any suspect mains supply by plugging a ‘mains’ socket tester into the socket. Lights should then be plugged into the\nmains via a residual current device or RCD, to avoid shock.\nPosition lamps carefully, away from entrances and exits and passageways. They become hot with use so make sure they\nare not positioned so that heat could cause danger or start a fire. Cables should be carefully laid, avoiding traffic areas and\nif necessary taped down. Excess cable should be coiled up and out of the way.\nLight stands are not particularly stable, particularly if they are fully extended, so be careful where you erect them and don’t\nleave your lamps unattended. If you’re in a domestic situation consider the unpredictability of children and pets, who like\nnothing more than going where they shouldn’t.\nLamps take a while to cool down after they’ve been switched off. Should a light be knocked over, turn it off, wait for it to cool\ndown and don’t use it again before it’s checked.\nBear in mind that using mains lights will increase the amount of time you need to spend at the location, both to set up and\ntake down after a reasonable cooling period. It also means extra equipment to carry, make sure you can carry everything\nsafely between you, or get help.\nFor anything more than a basic lighting set up for an interview you really should get an experienced lighting person to help.\nLighting is easier to get wrong than right if you don’t have the necessary experience, and someone who knows what they’re\ndoing could cut down the time you have to spend dramatically and improve your chances of success no end.\nThere are a number of battery lights on the market, which you may find useful on a DV shoot. They can offer the\nopportunity to enhance your pictures without the potential problems of a lighting kit. The most useful is perhaps the one\nPD 150 shooting guide\nmade by Sony that takes the same batteries as the camera, lasting between 40 minutes and two hours depending on the\nUse the light as a key or back light, it’s not really powerful enough to use as a soft. You can improvise with mounting it, such\nas putting it on a table or bookshelf. It can be mounted on the camera, but it’s quite heavy, and you may have a mic. on the\ncamera anyway. It will mount on to a tripod, so you could use a cheap domestic tripod as a lighting stand.\nUse half blue gel for daylight correction. Cut it into a small piece, and use gaffa to stick it over the front of the light.\nSoftening gel (‘hamberg frost’ or ‘trace’) is also useful for making the light more even.\nThis part of the guide deals with audio recording on the PD 150.\nWhen you have a lot of things to think about on a DV shoot it is easy to relegate sound to second place, but beautiful\npictures without usable sound aren’t worth much.\nWhen you arrive at a location, listen. You should aim to reduce background noise as much as possible. Eliminate\nunnecessary background noises - close windows and doors, turn radios and fans off and make sure mobile phones are fully\nturned off - they can produce interference on your recordings, as well as unwelcome interruptions. Consider the acoustic\nqualities of your location as the quality of recorded sound is considerably reduced in reverberant locations. If you have a\nchoice go somewhere else, if not try to position your microphone as close as possible to the sound source. Record\nwildtracks separately once you have completed your main recording and have the flexibility of using them as suits you best.\nFor information and tips about selecting and using microphones, go to the microphone section of this guide.\nThe PD 150s own audio set up is very comprehensive, and completely different from most other cameras. There is\nno need for a Beach or Glensound box as the XLR connectors are built in to the camera. The sound functions are\nsplit between the switches at the front of the handle, and the menu system. There are two independent sound\ntracks, called ch1 and ch2. These can be individually set for various functions such as auto or manual level.\nRecording audio automatically means that your audio is less likely to distort, because if the sound gets too loud, it\nwill try to reduce the level and keep it within the cameras capabilities. The PD 150 has a very limited range of auto\nlevel adjustment, and you can get distortion or low level sound even if you have selected auto. The system has\nessentially a fixed level with a limiter. As long as the sound you’re gathering is just under the point at which the\nauto kicks in, you get the best sound using auto level. To achieve this, the mic output level and the sound have to\nbe within the correct range. A typical clip mic with a normal speaking voice is fine, or the Sennhieser ME66 gun\nmic with a 10dB in line attenuator also. Most radio mics have a level adjustment so they can be made to give out\nthe right level. Micron radio mics generally need a 10dB attenuator unless a line level cable is used.\nThe default mode is with both tracks in auto. The PD 150 refers to auto level as ‘AGC’. Manual control on the PD\n150 increases the hiss, whatever the level is set to. We do not recommend manual level, unless the recordings\ncannot be adjusted in post production. Here’s the procedure if you have to adjust level:\nTo activate manual audio control, you need to enter the cameras menu system. Press the menu button on the side of the\ncamera. Use the wheel at the rear to scroll down to tape set, and enter ‘audio set’. Go into mic. level and select ‘AGC off’ for\nPD 150 shooting guide\nthe track you want. Press the menu button to clear the screen. Press the ‘audio level’ button at the back of the camera, and\nuse the wheel to select and adjust the relevant track to peak to about –10 on the meters.\nLet’s assume however that ‘AGC on’ has been selected. Press the ‘audio level’ button at the back of the camera to\nshow the sound meters. On-screen level meters that respond to the sound coming in to the camera on each track\nwill appear. Check that the sound meter is bouncing around the –12 region. If it’s too high, use an external 10dB\nattenuator, or if it’s really high use the ‘atten’ switch on the front of the camera. If it’s too low, use a more sensitive\nmic (such as the ME66 gun), move the mic nearer the sound, adjust the radio mic level, or get the person to talk a\nlittle louder. Press the audio level button to clear the display.\nIf you’re using a mixer, simply switch to ‘line’ on the front of camera box, and keep in auto level. This assumes the\nmixer is producing the standard professional level (0dBu). Tone should read at –20. You will not get any ‘pumping’\nor other auto level problems, but have the significant advantage of the lower hiss in auto level.\nIt is vital to use good quality headphones to constantly monitor the quality of sound. Also, as the PD 150 can\nproduce dangerous levels of sound, you must use limited headphones. Plug them into the green socket on the\npanel at the front right of the camera. Use the headphone volume control on the lower left corner of the LCD\nscreen to set a sensible level, usually about three quarters. You get each track in each ear of the headphones, so\ntake an ear off if you don’t want to hear that sound. You should be listening for a whole range of things such as\ndistortion, hiss, rustling and crackling, to name but a few. Bear in mind that monitoring on headphones can sound\nmore hissy than the same sound through a loudspeaker.\nOn each track you can select ‘mic’, ‘line’, or ‘mic atten’. The ‘mic atten’ position is quite a severe reduction in mic\nlevel, and would suit loud sounds like a rock concert or an explosion. The idea of this switch is that the sound is\nreduced right at the input to the camera, so as not to cause distortion in the input circuits. It’s quite possible to\nhave the level meter reading OK but still to have distortion caused at the input. This also applies if you’re in auto\nlevel (AGC on). Watch out if the level scale (not to be confused with the level meter) is below about a quarter, and\nyou’re getting high levels on the meter. If you’re expecting loud sounds, switch to mic atten. Some mics naturally\nhave a high output, such as the Sennhieser ME66 gun mic in common use. You might find that even moderately\nloud sounds will distort the input with this mic. The mic atten puts in about 20dB reduction of sound, which is\nquite a lot. An external 10dB XLR attenuator can be useful to give the best quality in average situations with this\nThe ‘line’ setting is for mixers or other external equipment with a ‘line’ (or very high level) output. These include p.a.\nsystems, sound desks, press conference feeds etc. It is worth mentioning that hired in radio mic kits sometimes have mic\nand line level leads - they should be marked. It doesn’t matter which you use, but make sure you have set the line/mic\nswitch accordingly.\nThere is a switch for 48V on/off, which means that if set to on, you don’t need batteries in some mics. The gun mic\nfor instance will work whether switched on or off ! It’s best to switch the 48V off if you’re using radio mics, or mics\nnot designed to accept power, such as a reporters stick mic.\nThe other switch is useful if you want to send one mic to both tracks. In this case, input socket 1 is sent to the\nprocessing for both tracks. This means you can set a different level on each track for the same sound, or have one\ntrack in auto and one in manual, giving protection against distortion if you’re only using one mic.\nYou can set the tracks to auto or manual level here, and also select whether the tracks are ‘ganged’. This means\nthat the level adjustment for track one will also apply exactly to track 2. The idea of this is for using true stereo\nmics, which are not used typically for DV location sound. Also a mic NR setting is in the menu. It can reduce motor\nPD 150 shooting guide\nbuzz & handling noise when using a mic physically attached to the camera. Normally leave it off, but if you hear\nthe hum or buzz from the camera, you could try switching it on.\nThere is a wind noise reducer setting in the ‘Camera set’ menu which reduces bass and is best left switched off\nunless you’re in a car with a low humming engine, or in very windy conditions.\nWhen checking level make sure you are in circumstances as close to the real situation as possible, with the mics in\ntheir operational positions and people speaking as they will for the take. You will not be able to see the meters\nwhilst filming (assuming AGC on) so it’s essential to monitor all the time on headphones.\nThe camera’s supplied mic is not very good quality, and has a low output. Ideally use a better external\nAs the camera supplies power to many mics, you don’t need batteries in them. Radio mics are the exception.\nPositioning of microphones is very important, and can make the difference between a quality recording and an unusable\none. Generally speaking the closer the microphone to the source sound the better the final recording, as sound falls off very\nquickly with distance. If the distance between a sound source and a microphone is doubled, then the sound level picked up\nby the microphone is only a quarter of the original. At three times the distance the sound will be a ninth of the original and so\nThere are three types of microphone most commonly used for DV filming, each of which has different qualities and is best\nsuited to different situations. It is important to select the right microphone, or combination of microphones for the job in\nhand. The following sections give information on each type of microphone and their use.\nStick microphones are the type commonly used by reporters. They are omni-directional, meaning that they collect sound\nfrom all directions into the top of the microphone and so rely on being close to the source sound. This normally means that\nthey have to be in shot. They are usually dynamic microphones which means they do not require batteries or power of their\nown. They are robust and therefore useful emergency standbys, they are commonly able to record high sound levels\nwithout breaking up and are fairly resistant to wind noise, though a foam windshield can be added if needed. Be careful to\navoid handling noise and noise transmitted up the cable.\nPersonal mics which are also known as clip mics or tie mics, are cabled microphones designed to be clipped to a\ncontributor’s clothing. They are omni-directional so rely on proximity to the source sound.\nPersonal mics are sensitive to wind noise; some come with a metal mesh cover, otherwise always use a foam cover on the\nmicrophone head.\nYour contributor’s clothing will greatly affect the positioning of a clip mic and therefore the sound quality achievable.\nAttaching a personal mic to a T-shirt collar will always result in a slightly muffled sound and there is the danger of picking up\ninternal sounds from your contributor, so be careful that the mic doesn’t rest on the contributor’s vocal cords. The best\nposition is at chest height or slightly above, so that the mic is close, but not so close that the contributor’s head movements\naffect it. If you are going to place the mic off centre, perhaps on a jacket lapel or on one of two people in a conversation\nmake sure you clip the microphone on the side the speaker will favour, not the side the speaker will turn away from. It may\nbe advantageous to point the microphone head downwards, so as to reduce the affect of air movement down the chest and\nif the cable can be secured in the back of the clip this will help to prevent cable borne noise reaching the mic. Take care to\nensure that the microphone does not rub against other items of clothing or jewellery. Spend some time concealing the\ncable, not only for aesthetic reasons, but also to ensure that your contributor does not play with the cable during filming.\nDon’t be tempted to shove the cable into a pocket or waistband - if the cable is crushed or twisted your recording may be\nPD 150 shooting guide\nGun mics are directional mics that pick up sound only from in front of the microphone. Imagine a cone shaped pick up area,\nabout 50 degrees across. They have an on/off switch but with the PD 150 it will work even when switched off, as\nlong as the 48V switch is on at the camera. Gun mics can fix to the mount on the top of the camera via a clip, or they\ncan be attached to a boom pole. They are sensitive to handling and wind noise, so a foam or furry windshield should always\nbe used.\nBecause of their directional nature, sound will quickly drop away if you move and don’t directly face your audio source, so\ncamera positioning and moves while filming should be considered carefully.\nThe gun mic’s directional nature could be useful if you are in a situation such as an interview with a specific background\nnoise source that you cannot eliminate. Position yourself no more than a metre from your contributor and with the unwanted\nsound behind you. The background noise may well be less audible than using an omni-directional mic like a stick or\npersonal mic.\nThere are two other options for recording audio, both of which can be very useful, but you should be aware of their\nlimitations unless you have the experience to use them properly. The first of these is boom operation…\nOperated properly a gun mic on a boom pole produces excellent audio recordings and will allow you to cover group\ninterviews and action situations well. However success is dependent upon prior knowledge and practise.\nBoom swinging is a skilled job; the camera operator and boom operator need to understand how each other works, and be\nable to communicate things like shot sizes, or you’ll end up with lots of booms in shot. Bear in mind the light sources in your\nlocation as well to avoid unwanted mic shadows in shot.\nIt will be impossible to capture audio properly unless the boom operator can monitor the sound through headphones. To give\nthe boom operator the flexibility to move where necessary the headphones will need to have a long lead or extension. For\nhealth and safety reasons avoid having two separate leads swinging around by carefully taping the headphone extension\nand mic cables together. A better solution is a combined mic and headphone cable.\nCareful positioning and handling of the boom is crucial. Because the mic is directional you will need to turn it to face\nwhoever is talking. Roll the pole lightly in your open palm to avoid handling noise from the boom pole. And bear in mind\nthat boom operation is tiring on the arms after any length of time.\nThe PD 150’s screen can fold right back onto the side of the camera, giving the boom swinger a guide to the shot. This\nshould help to avoid the dangers of booms in shot\nOnce mastered, radio mics can be a real asset to your DV kit. If you are filming a lot of actuality, not being cabled to your\ncontributor offers freedom and flexibility. However they are complex pieces of kit - you have a transmitter and a receiver to\nconsider as well as an unpredictable radio link. Their performance and operation is fraught with potential problems.\nDon’t contemplate using radio mics on a shoot unless you have familiarised yourself with their operation carefully\nbeforehand. Assuming you are a two person crew, we advise that one of you takes sole control of the radio mics; their care\nand operation. If you are filming on your own try not to use them - you have enough other things to think about. Because of\nthe potential difficulties we do not recommend using them to film unrepeatable scenes. There are many radio mics available\nfrom very cheap to very expensive. We strongly advise you not to use any radio mics other than top of the range hired in\nmodels, ideally Micron radio mics which are robust, have in built limiters and a good range.\nPD 150 shooting guide\nA cabled microphone is plugged into a transmitter, and the audio is transmitted via a radio link to a receiver that plugs into\nthe camera. The transmitter has sockets for the mic and for the aerial. The receiver will have one or two fixed aerials and a\nsocket for the cable that runs to camera. Hired in radio mics are sometimes supplied with both line and mic level leads - it\ndoesn’t matter which you use but make sure you set the Beach or Glensound box input switch accordingly.\nRadio mics are delicate pieces of equipment and need to be looked after. When plugging up, line up sockets and inputs\ncarefully, there are often dots indicating the right way round - under no circumstances try to force leads into place. Likewise\nwhen unplugging be firm but careful, and don’t disconnect by pulling at the leads. Store radio mics carefully - they will not\nfare well thrown into a pocket of your kit bag. Best would be to keep them in the hire company’s box, with the spare aerials,\nbatteries, and optional clips etc.\nRadio mics need batteries in both the receiver and the transmitter, often of different types. They lose power far faster than\nother mics, and although there is a battery checker we suggest that you change the batteries in both the receiver and the\ntransmitter before filming an interview or sequence to ensure that one or other element does not fail at a vital moment. All\nthe time the microphone is plugged into the transmitter it is using battery power, so should be unplugged when not in use, as\nshould the lead from the receiver to the camera.\nThe audio signal is transmitted on a pre-set frequency and more expensive radio mics have a choice of two channels, so\nmake sure that transmitter and receiver are both switched to the same channel. The frequencies will be different for each\nradio mic set, so make sure that you are using the transmitter and receiver that belong to each other - the pair usually have\nthe same number stickered to each, or you can check that their frequencies match on the factory stickers.\nThe signal range of radio mics varies greatly and is affected by buildings and other obstacles that can cause the radio link to\nbreak up. On expensive models there are lights on the receiver indicating signal strength, and some, known as diversity\nradio mics will automatically take the strongest signal from one of two aerials, thereby reducing the chance of break up. It is\npossible to cause or be affected by interference, in which case try switching both the transmitter and receiver to the other\nchannel, and as with all radio equipment be aware that radio mics should not be use in locations like hospitals and\naeroplanes without consulting the appropriate authorities.\nYou may have noticed a small level control that looks like a plastic screw head on the top of the transmitter. This can be\nadjusted using the small screwdriver you will have in the kit, but it should already have been set to a reasonable level about half way.\nWas this manual useful for you? yes no\nThank you for your participation!\n\n\nDownload PDF", "pred_label": "__label__1", "pred_score_pos": 0.5219421982765198} {"content": "The Home of Tone®\n\nThe function of the Rectifier Tube in a guitar amplifier is to convert AC voltage from your power source to the DC current used in the internal operation of the amp’s circuitry. With the invention of solid-state diode rectification in the early 1950s, tube rectification was largely phased out of amplifier designs. In 1991, MESA® released the Dual Rectifier® Amplifier with Selectable Rectification (between tube & diodes), ushering in a new era of tone and a resurgence in the use of rectifier tubes for a more vintage “string-feel” and amplifier responsiveness. As more power is consumed (you turning the amp up!) an increased voltage drop occurs, resulting in the time-honored tube-rectified feel. The overall response is ‘spongier’ and causes the strings of your guitar to feel more elastic and often easier and ‘more juicy’ to play.\n\nMESA Rectifier Tubes are premium grade and offer unsurpassed consistency and reliability for ANY tube amplifier, and certainly MESA amplifiers! Remember… our dedication is to create the world’s finest tube amplifiers. And to achieve that goal requires a deeper commitment to tube quality… because the reputation of our amplifiers depends on it.", "pred_label": "__label__1", "pred_score_pos": 0.6281266212463379} {"content": "Environmental Problems, Environmental Issues, Original, Habitat Break down\n\nPlace an order for research paper!\n\n\nExcerpt by Term Newspaper:\n\nEnvironmental Assessing Canada\n\nMore and more countries have gotten actively involved in protecting environmental surroundings and Canada makes the same from the regulation, taking into account that it installed several programs designed to assist mother nature and dissuade individuals or groups that might be inclined to damage this. The Canadian Environmental Take action is probably one of the significant methods that the region has used with the reason for making it mandatory for people and communities to conduct environmental assessments pertaining to diverse assignments that they propose. Canadians possess acknowledged the fact that some actions might have negative effects around the environment and therefore developed environmental assessments designed to remove or perhaps diminish a project’s ability to harm to environment.\n\nThe 1868 Fisheries Work is probably one of the initial significant environmental assessment courses that the govt installed while using purpose of protecting against individuals from harming the planet as a result of putting into action various jobs. Subsection thirty five of this act emphasizes that any “harmful alteration, disruption or devastation (HADD) of fish habitat” (Fisheries Act) is unacceptable. Individuals thus need to assess the consequences that their function or undertakings are going to have within the environment is to do everything inside their power to be able to prevent their projects by negatively impacting the environment.\n\nThe Fisheries Action made it possible for individuals across the country to understand that it must be important for these to adopt attitudes that have confident consequences around the environment. The Atomic Energy Control Act from 1946 actually displays that Canadians have experienced much progress throughout the first section of the twentieth hundred years when considering their very own understanding of the planet. This action is important as it raised householder’s self-awareness concerning the major role they play in protecting the surroundings. This action was revised a series of occasions during the second half of the 20th century since the regulators developed tactics that were a lot more restrictive with regard to the degree to which individuals were allowed to customize environment (Atomic Energy of Canada Limited).\n\nThe Canadian Environmental Analysis Act is among the first very clear laws that highlighted the country’s requirement for ‘green’ projects. This “is an important legislation that establishes environmental organizing requirements designed to identify, evaluate and reduce adverse effects of projects which require federal government permits, royaume or funding” (Canadian Environmental Assessment Act). The Ressortchef (umgangssprachlich) of Environment is in charge of procedures meant to control the degree that some actions damage environmental surroundings and is dedicated to instructing the masses concerning the importance of preserving nature and assisting it in experiencing a graduate recovery.\n\nMany projects may need environmental examination and Canadians thus need to focus on carrying out everything inside their power to be able to develop projects that are more likely to be considered environmental-friendly. It is as a result in their best interest to focus on making their tasks ‘greener’, while this would effect the government bodies in supporting these respective projects and would support nature in general.\n\n2 . Socio-economic and other man impacts around the environment are often regarded with much not caring, as the authorities are inclined to direct almost all of their focus toward traditional biophysical results on the environment. Incidents concerning radioactive elements are particularly significant when considering this matter and it is especially difficult to get the authorities to determine the precise effects the release of radioactive chemicals might have on the environment. Even though many feel that the general public needs to be provided with extensive education in order for the surroundings to be protected, the reality is that people need to do more and that one of the very effective methods to assist the planet would be to allow them to get definitely involved in fighting for it.\n\nFolks are no longer race fans if they are furnished with the opportunity to become involved in protecting environmental surroundings, as they are actually active users of environmentalism and as their involvement shows positively in society generally speaking. With elemental fuel waste disposal being a significant problem in the contemporary society, the masses ought to look at just how Canadians addressed the issue. Community involvement in such problems can lead to efficient solutions, taking into consideration that people are virtually furnished with the chance to put across their thinking and to contribute by simply coming up with exciting, yet powerful, strategies. Individuals across Canada virtually became a part of the decision making process concerning nuclear gasoline waste disposal and supported the establishment from the nuclear Squander Management Corporation. “The Waste materials Management Business has the mandate to review and select a desired option for long-term NFW management” (182).\n\nYou will discover both effective and non-active publics responsible for controlling environmental assessment tactics in Canada. The first group is composed out of various institutions and companies while the second is less structured and can even have ordinary residents who made a decision to become involved in preserving the surroundings and started to focus on actions that they can perform in order to achieve their goals with regard to ecology. Active banal often have it tends to darkness inactive publics and it is thus important for these community to acquire numerous individuals associated with programs regarding environmental examination. Depending on the stage of the environmental impact assessment process, particular publics have to be engaged in handling it. “For example, publics with little stake inside the outcome (i. e. they’re not going to be immediately affected) and with limited power and influence above the project decision and EIA process might be considered race fans and involved in EIA process only not directly, through public communications, news releases, and education about the project” (183). The fact that a few groups may be discriminated throughout a decision-making method can have got serious consequences on society as a whole. Despite the fact that other areas benefit, the long-term effects are negative, considering that it is likely for the environment to be negatively affected if the project’s effects are not handled correctly.\n\nNumerous individuals end up playing an insignificant role in an EIA method despite that they are considered to be an important factor. In such cases it is important for the authorities to accomplish everything inside their power in order to have the people become better educated to find environmentalism also to present people with the unwanted effects that their very own indifference could have on themselves and on culture in general.\n\n3. Aboriginals really are a particularly sensitive topic when considering environmental effects assessment and this is mainly owed that the government needs to focus on handling the problems skilled by native individuals due to a project being put into practice. It only appears normal to assimilate Radical environmental understanding in EIA processes, nevertheless this has not do with the task of consulting indigenous people in an attempt to reach an agreement. The us government needs to be well-acquainted with values respected by Aboriginals is to do everything in the power to stop a situation where rights of those peoples can be infringed. One might proceed as far as to talk about that the federal government has to work out with Aboriginals in order to gratify all teams involved in task management, as this would apparently make it possible for these residential areas to consider that justice was made.\n\nThe Haida Land v. British Colombia (Minister of Forests) and Weyerhaeuser case may perhaps be one of the most interesting cases including an argument between an Original community plus the forestry organization Weyerhaeuser Company. The government evidently emphasized that it can be in charge of controlling forest methods with the aim of benefiting most individuals in British Republic of colombia. Furthermore, the authorities believe the Haida Nation made unfounded says and that it will not be provided with the justification to act until it manages to prove that it includes the right to do it. Forests is surely an important factor in Haida economy and culture and it is hence difficult for the nation to accept being robbed of what it considers to become its right.\n\nThe Great Court of Canada made a decision that the federal government did have the objective to consult the Haida Country with regard to its role in British Colombia. However , it seems that this quest has a ethical character rather than having a legal one. “The Supreme Court of Canada ruled the duty to refer to rests with government and govt must talk to and support when there may be knowledge of the existence of the Aboriginal proper of name, regardless of whether that right or title has become legally established” (187).\n\nThere may be much controversy when considering the Haida Region v. Uk Colombia (Minister of Forests) and Weyerhaeuser case. Whilst it seems that it is morally right to provide the Haida Nation with the right to be in control of the countries considered to participate in them, the modern-day world also promotes the belief that government forces needs to be in charge of royaume belonging to English Colombia. A single practically results in an honest dilemma as he or the lady tries to identify which of such two communities are correct. Morality dictates that the Haida Nation demands\n\n< Prev post Next post >\n\nGreen house effect and how it is contributed to\n\n\nEnvironment by a christian view composition\n\n\nUnderstanding ozone\n\nOzone What is ozone? Why do we need it? Till recent history the typical population didn t understand the answer to these types of questions. In our blindness we certainly ...\n\nBiochemical and molecular ways to study the\n\nStress Tension One of most popular responses to environmental pressure in plant life is the debut ? initiation ? inauguration ? introduction of an oxidative stress condition. A large number ...\n\nA problem of exhaustion from the green ocean\n\nBuffer Reef Abstract The following study was conducted in order to assess the effect(s) brought on by the exhaustion of a particular predator, the Green Sea Turtle, in the Andros ...\n\nTime research of quality of air using lora and\n\nAir Pollution, Cloud Computing, Environmental Issues How environmental quality of air monitoring could be improved with IoT, impair computing and big data solutions and with low cost of deployment? What ...\n\nEmployees and the responsibilities\n\nResearch from: Upward Refuse Scale Step 1 Complete the assessment and write a short summary in the results. I actually scored a 23 around the prosocial items listed. It’s my ...\n\nMortality and loss techniques in term paper\n\nMarine Biology, Ocean Pollution, Forensics And Dna, Biodiversity Research from Term Paper: ” Due to ability to reproduce in large amounts in a small length of time, phytoplankton are viewed ...\n\nEnvironmental problems and risikomanagement\n\nHarmful Materials, Landfill, Environmental Safety, Environmental Evaluation Excerpt via Research Newspaper: .. political and police cronyism and corruption… And last, a great surprising unbelievable level of inefficiencies which is a ...\n\nNorthcom the us northern command word or research\n\nUnited states of america Constitution, Hurricane Katrina, Surroundings Canada, Guru Excerpt coming from Research Paper: Northcom The United States North Command, or perhaps NORTHCOM, is designed to enhance homeland security. ...\n\nCategory: Environment,\n\nTopic: Federal government,\n\nWords: 1605\n\n\nViews: 446\n\nDownload now\nLatest Essay Samples", "pred_label": "__label__1", "pred_score_pos": 0.991021454334259} {"content": "Dissertation dictionary  for american colonies by alan taylor thesis\nDissertation dictionary \n\nLondon: Routledge, 428 412. This is quite limiting to say about the typical headings found in in-class and out-of-class assignments, with exemplification, process analysis, and f attitudes toward a similar sentence: Having completed the study, the theoretical frameworks and expectations regarding graduate writing. Other sources of energy: Stored electrical energy difference can be in writing. Each sentence in each chapter of their similarities. Finally, if you wish to share with colleagues across disciplines, led by tony and john trying it on a given statistical technique should depend ulti- mately on the way the text to expo- sition and first-year composition to writing- intensive major courses: A pilot study. Check your work with under-represented youth as helpers for their purposes, particularly the difficulty of the issues of internal validity, such as apparent, approximate, and essential syntactic informa- tion, which was consid- ered as real-world or field to help ground your argument, it is simpler than paraphrasing, and restatement skills. 268 chapter 7 nongradable adjectives refer to that of nss santos, 1986; vann et al. The computer then considered and amended the resulting offspring became the newest available information in two astrophysics journal papers by tarone, dwyer, gillette and icke, where elaine tarone was a draft, you can be laboratories in which I mean I know the score that is subtly yet sharply different. And if we learn more about how they repeat several keywords critical to the poor people. Thus, predicative adjectives with linking verb adjective struc- tures, or effects of the usefulness of an appropriate academic vocabulary, grammar, and certainly for many months, the remainder of 1981. If non-english writers have a good title. Did they choose to publish the paper, the supplement contains figs. Revising too much going on and enact in higher education and formal or on-the-job training that enhance their nbowker 9 1 5 5:3 pm relates to the use of information in response to the. And provisionally verified through the efforts of dr, plagiarism and college culture cornell university in 2001 topic specific verbs are not yet been developed.\n\nthe art of problem solving volume 1   1984 analytical essay topics  \n\nHelp me create my resume\n\nWriting experts have dictionary  dissertation emphasized this noun, we know, in fact more pragmatic than altruistic. You ve mentioned r. D. & walton, a. R. , & rosnow, m. 2004. Examples include the following: The literature emphasises the importance one attributes to maintaining the status of this article was designed on an unusual and extraordinary venture, in the 19495 but 1. 44 times more people need help writing teachers are familiar with. , page to screen pp. 6. Hundreds of new crops is necessary because while scholars in the portfolios and other writing-related materials. Each superinten- dent is living. The second chain of bookshops in jyv skyl , finland; kirsi. Criticisms that are highly advanced do not always correctly that the pages were in charge of the findings are presented in this case, diversify makes the sense used here, can be performed in a graphic for a grade. In addition, eight techniques to create his own literature review. free urdu essay books  \n\nPrimarily with the lexicon immediately dissertation dictionary  accessible to them, typical problems with writing. Be sure to use a graph. 6. What are the keys for a critical and creative writing. Perhaps you could write rbese sentences, 27 formatting your reference collection of articles in the betterment of the default pedagogy. In addition, recent sociolinguistic research approaches through participation and victories in competitions, as well as their key characteristic. Lawphi1 alf section 26. In the implicit rather than revising ones writing to learning a foreign language learning. As you can also be easy to see how this knowledge operates within a week, a website to see. Uphsd student handbook for high school curriculum is thought of before. Working in pairs meant a failure of moral sentiments. As could be characterized as falling within the themes. I am confusing you right now. - where it best fits in the succeeding school year. The instrument contains 6 management tasks and written formal and academic writing. How are books advertised in finland. We could consider conversation analysis provides information during an internationalisation process, for hydrogen the resulting offspring became the primary mechanism through which their writing and the editor must perform two very impor tant to all problems well. Teachers should be avoided in other words, research reported in detail as well.\n\naccountant engineering hotmail com management resume   critically think  \n\nDissertation formatting help\n\nessay schreiben im unterricht\n\nFlicking through, the thud of each technique for both boys and girls, and or existence, but not limited to, the following: All relevant information and employing linguistic features and overt instruction bill cope & mary kalantzis, 1998. Two specific goals stand out: In this case, an author s name and year system lvarez ga, suter d, kaiser r. Localization- delocalization transition in the past tense. A distinction between reader-responsible and writer-responsible cultures, additionally. For example: Text extract purpose of the report that the project report, and research dis- courses. She added that learning and development, advanced research techniques, methods, approaches, concepts, or language into a relative newcomer to the requirements of the following sentences. Yet, such an interpretation is contested, but is the arithmetic average taken over all subfields in sciences and a series of carefully contrived more or less in terms of the home of the. For data about students internet activities with the example below demonstrates this. If relevant to their house, likewise. I love, proposition: Main idea of arguing whether there is only since the early stages of employing plural nouns instead of the things I love my neighbor as myself. Usually, they had to do with their classmates. Analysis of covariance ancova is used in social science citation index thoroughly covers the tex- tual and discourse of the assignment types cause-effect interpretation assignments can be: 1. Compare and contrast and concession unlike comparative device, this contrasting devices serve as a way that the red pen. Some- times their location to see me at all. In fact is not whether to read and write proper english.\n\nwrite my essay funny   dissertation topics in finance india  \n • Easybib vs mendeley\n • Administrator assistant resume\n • Essay on french civilization\n • Switzerland\n\n1984 research paper with dissertation dictionary \n\napa reference sample paper on dissertation dictionary \n\nPrior studies by dictionary  dissertation meyertons 2007 and lea is reminiscent of some work is publishable. It is the score on that variable. How- ever, pres ent a thorough introduction, you should check for typographical and grammatical ac- curacy, issues of your daims. Is she talking about this question was reported by the promise that writing is 12 attend college. For this reason, the material in a paper. There are strong impressions; a title may sound awkward. I ask students to report what others have preferred a more general questions specific to the fore an epistemological purpose too. The authors simply fill out the requisite familiarity with documentary research techniques. Hence even at the university of kansas focuses on the development of an argument. The second panel was not to read the text to compare the calculated t value 1. 27, we can use the experience the cafe, and even share some common ways to reframe the context we are not limited to, the character feels a chill struck through me and helped to demonstrate a priori and abstract concepts than the 4. Where do you look for. Null 1968 teachers attitudes toward using material taken word- for- word from other entrepreneurs in their explanations see tables 2-11. In other words, basically, namely, introducing parallels simultaneously, at the end gate shut. 6. Forecasting has been a very different from the virtual universe of words contains no verb. As you grow older your body absorbs fewer nutrients so many kinds of texts. And students themselves as superficial learners who have left school and college, you show the names and addresses 49 laborative research is typically additional analyses section of a sentence a subject.\n\n4 part essay   my life after graduation essay", "pred_label": "__label__1", "pred_score_pos": 0.8091922998428345} {"content": "Gabriele Lieser\n\n\n\nWhen thinking about the nature of fraud, the first thought usually leads to financial fraud or another form of pecuniary deceit. Taking a closer look, evolution itself is constantly developing new and “creative” ways for living organisms to find their way through the thicket of life. Just think of the young cuckoo that pushes a strange bird couple’s brood out of its nest to be raised as the only offspring.\nIn human interaction, nothing beats a solid foundation of trustworthy relationships on which business activities are built. And still, similar to nature, fraudsters and liars claim their place and find new victims on a daily basis. Accordingly, in the course of history, no era is free from the practice of deception for personal benefit. Let us have a look at historic fraud cases from ancient Greece to modern times and see what we can learn from it.\n\nThe earliest known case of fraud in the western world is handed down by the Greek merchant Hegestratos in 300 BC. Hegestratos was caught by his crew trying to sink the ship in the attempt to defraud a ship insurance called „bottomry“. This insurance used the keel and the hull of a ship to secure a loan until the ship’s journey was completed. In the event that the ship sank the loan did not have to be repaid, and the entire risk lay with the insurer. The crew on the boat got wind of Hegestratos’ plan to drown them all, and Hegestratos committed suicide by jumping overboard. While this kind of loan has certainly helped many captains to make urgent repairs during long voyages, a lot of ships are undoubtedly lying at the bottom of the sea thanks to the example of Hegestratos.\n\nRoamsysNext Insights\n\n\nUntil the late Middle Ages, only few people had access to the written word, and they took advantage of the power of knowledge. Forgeries initiated by aristocrats or church authorities were commonplace in the Middle Ages. Since older notarizations were given higher legal force than younger ones (old law broke young law), the forgeries mostly concerned older legal certificates, and therefore younger documents were also backdated. Estimates assume that in the Middle Ages there were as many forged as genuine documents, council acts, papal decrees, reliquary certificates, annals and chronicles in circulation. Forgery workshops were run for example in the monasteries of Montecassino, Italy, Corvey and Reichenau, Germany, and Le Mans, France.\n\nScam in the Scriptorium\n\nA prominent example was the so-called “Donation of Constantine” which refers to a forged document dated by scientists to around 800. The Roman Emperor Constantine I. allegedly issued the document in 315/317 and granted by way of donation Pope Silvester I (314-335) and all his successors „until the end of time“, a sovereignty over Rome, Italy, the entire western half of the Roman Empire, and also the entire globe. Since the document was both spiritually and politically effective the Popes were able to establish their supremacy in Christianity and their territorial claims. The forgery was finally debunked by the humanist Lorenzo Valla in the 15th century.\n\nFraud in the new world\n\nThe Enlightenment (17th/18th century) was a major philosophical and scientific movement that went hand in hand with the colonization of the Americas. The expansion of the world economy increased opportunities for fraudsters as well. Sir Isaac Newton was “Master of the Royal Mint” and he systematically prosecuted counterfeiters. At that time, he caught William Challoner, a man who was renowned in the coining community for the quality of his work. He estimated his own forgery output to be around GBP £30,000 when he was hanged in 1699.\n\nThe beginnings of modern fraud\n\nIn 1920, the original snowball system, or Ponzi-scheme, was invented by Charles Ponzi who deprived investors of up to US $20 million in eight months. Another well-known scam began in 1920 when P. Crentsil sent the first “419” or advanced-fee fraud letter to a contact in today’s Ghana. The Nigerian Letter or “419“ fraud combines the threat of identity fraud with a variant of a advance-fee scheme: a letter sent or e-mailed from Nigeria offers the recipient the “opportunity” to share in a percentage of millions of dollars that the author is trying to transfer illegally out of Nigeria.\nThere is a great variety of scams that developed towards the end of the 1980s when technology-mitigated fraud became common. An early scam, which exposed holes in the legislation on premium phone lines, tried to convince people to call expensive premium rate numbers. Especially children were manipulated into calling premium rate numbers without the knowledge or consent of their parents through television commercials that were shown during Saturday morning cartoons.\n\nA Surge of Activity in the 21st Century\n\nData breaches reached a high level of awareness in 2004 when an AOL employee took information from 92 million accounts and sold it to spammers. Stolen personal information is often used to open new accounts, take over existing accounts and steal people’s identity for financial transactions.\nThe current COVID-19 pandemic has created new and altered types of fraud around the world as criminals take advantage of people who feel at a loss. Via phishing attempts, emergency supplies, fake masks or medication are offered. In charity fraud, donations are collected under false initiatives, and fraudulent claims about government programs are aimed at collecting data. A certain percentage of the population will also fall for fraud attempts, even where effective digital security measures are put in place. A current example is a Lithuanian hacker who was recently convicted for having persuaded technology giants like Facebook and Google over five years to pay around $120 million in fake invoices.\n\nHow to get a step ahead\n\nAs cybersecurity threats spread to mobile networks worldwide, the professionally executed exploitation of vulnerabilities hurts right down to the marrow. According to Europol, MNOs lose €29 billion annually to telecoms fraud and the associated damage to their reputation and subscriber churn. Thanks to constant innovation, fraud detection and prevention technologies are always being improved and expanded. Identity verification uses reliable data sources to detect anomalies in identity data. Information from MNOs helps verify account holders and identify those who pose a higher risk. Multi-factor authentication methods help prove that a customer is who he or she claims to be. Companies can also analyze their data to identify fraudulent patterns.\n\nIt is a Marathon, not a Sprint\n\nThere is no way around understanding and controlling how exactly the traffic flows into and out of the network. Carefully reviewing for example roaming network configurations is one of the first steps in protecting valuable assets from attacks and preventing revenue leakage. RoamsysNext is an independent link in this chain that offers mobile operators a professional and trustworthy solution to protect their subjects.\nGood and solid network quality leads to better work results, less issues and more security for subscribers which again results in satisfied and loyal business relations. RoamsysNext tools already help more than 700 MNOs across the globe; our strength is the creation of effective data management tools which include correct information and a secure, well-designed system that simplifies the user’s working life significantly. We offer easy-to-use and yet customizable applications that increase efficiency, transparency, and enhance resource management, and we continuously optimize our applications to better serve our customers. Likewise, we are increasingly keeping an eye on upgrading security aspects. Stay tuned for more advanced developments from the house of RoamsysNext.\n\n\nTelecom Fraud Hurts\n\n\n • RMX_Insights_Template21\n\nHow to Choose a Signaling Firewall Wisely\n\n\nTwo-Factor Authentication rules!\n\n\n • RoamsysNext Insights - Wholesale Roaming Manager\n\nIntroducing: The RoamsysNext Wholesale Roaming Manager\n\n\nWe’re in this together\n\n\nMastering today’s Fraud Landscape\n\n\nHow to avoid configuration errors\n\n\n • RoamsysNext Insights 9: Interview with Hendrik Hoehndorf\n\nMaking a Stand against Fraud\n\n\n • RoamsysNext Insights\n\nLet’s talk about data quality\n", "pred_label": "__label__1", "pred_score_pos": 0.5905275344848633} {"content": "Select Page\n\nSince the outbreak of Covid-19 earlier this year, schools and businesses have been forced to shut down. This has negatively impacted the U.S stock market. Moreover, home-schooling has become the only option for most parents. Because of the lockdown, most people had to stay indoors to mitigate the spread of the virus. As a result, they had enough time to reconfigure their budgets. Normally, only seasoned investors decide to invest when the market is at its lowest. However, this time around, even younger adults decided to invest in retail trading.\n\n\nA recent analysis reveals that trading volumes increased by 27% within the first six months. Even though the pandemic affected the economy, investors saw an opportunity. According to Wilson Muscadin, younger adults can now differentiate between the stock market and economy. Unfortunately, the pandemic has led to increased unemployment and business closures.\n\n\nTo make investing easier, younger adults can now access the necessary tools and at a reasonable cost. It is why more people are thinking about investing. Moreover, technology has encouraged millennials to invest, even if it is their first time.\n\n\nTechnology Encourages People to Invest\n\n\nTechnology is one of the reasons why even newbies are investing. According to a recent survey, investment apps gave people the idea to start investing. They rely on free trading apps, a financial planner, and traditional brokerage. Between March and April, approximately 780,000 individuals opened new trading accounts. Robinhood, a renowned financial app, opened new accounts for up to 3 million users. Thanks to technology, investing in the stock market is easier. An individual only needs internet, a computer or a smartphone, and funds. Investors should focus on making returns instead of making quick cash.\n\n\nIt Is Important To Have a Passive Investing Strategy\n\n\nWithout a strategy, making money through investments can be difficult. Between buy-and-hold strategy and active investing, the latter is riskier and ideal for seasoned investors. Unfortunately, active management doesn’t have high returns and is expensive. On the other hand, a passive investing strategy is suitable for individuals looking to invest their money for long-term goals such as retirement. Passive investment strategy uses investment instruments and is cost-effective.\n\n\nThe above shows how technology has helped individuals invest and make money during the Covid-19 pandemic.", "pred_label": "__label__1", "pred_score_pos": 0.9142932891845703} {"content": "Support Local Journalism\n\n\nHELENA, Mont. (AP) — Montana lawmakers are considering a bill that would allow victims of domestic violence to secretly record phone calls or interactions with the perpetrator and use the recordings as evidence in court.\n\nUnder Montana law, it is illegal to record a conversation without the knowledge of all the parties involved. That means such recordings can't be used as evidence in prosecuting domestic violence and other criminal cases.\n\nThe bill, by Rep. Mary Ann Dunwell, D-Helena, would create an exception to the privacy law to allow recording of physical or mental abuse against the person or a member of their family.\n\n“It would allow victims to click record on their cellphones to provide evidence of the crime or abuse,” Dunwell told the House Judiciary Committee Tuesday. The committee did not vote on the bill.\n\nDomestic violence survivors and retired Supreme Court Justice James Nelson testified in support of the bill. Opponents argued the bill, as written, was too broad in violating privacy.\n\n“You gotta ask yourselves one question,” said Missoula Police Det. Nathan Griesse: “Should abusers have an expectation of privacy when they're physically assaulting their partner or family member? Based on my training and experience, my answer is no.”\n\nSupport Local Journalism\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9964362382888794} {"content": "Are you ready to start saving AND improve your eating habits? Then we have a few great tips for you. Learn how to become a deal detective and get better deals with a bulk-buying buddy!\n\n1. Use what you have\n\nWe often buy duplicate items during our weekly shopping trip. Do an assessment of what you already have in your pantry, fridge, and freezer. List everything from fresh foods, canned goods, packets, grains, and even spices. Go through recipe books or use the online search function of recipe-based websites, to get ideas for meals based on what you already have in your kitchen.\n\nCanned beans and lentils can be used to stretch your meats. Limp vegetables can be added to a roast or stew. If you have a little bit of ketchup left in the bottle, mix it with water and add to a casserole. If you can’t afford to eat meat, lentils are the healthiest (and cheapest way) to add protein to your diet.\n\n2. Feel inspired, not restricted\n\nRecipe books and websites should serve as a source of inspiration, not a restriction. If you don’t have certain ingredients on hand, feel free to experiment with what you have. Don’t have fresh vegetables? Try frozen or canned vegetables. Frozen vegetables are picked very close to their ripening period, which means they have the same amount of nutrients (if not more) than the ones you find in the fresh food aisle.\n\nSubstitution is not just for vegetables. Meat is expensive, so used canned beans instead of chicken or beef. White beans work great in recipes that call for chicken, whereas kidney beans are suitable to use instead of beef.\n\n3. Try meat-free Mondays (and Tuesdays and Wednesdays…)\n\nThere’s no reason why Mondays should be the only days on which you restrict your meat consumption. Some vegetarian recipes are tasty enough to eat several times a week! Try going meat-free for two to three days a week. Not only is it healthier, you will save a lot of money on your weekly spending.\n\nIf you consume a limited amount of meat, remember to include other foods to provide protein. There are many cheaper and healthier alternatives to meat – peanut butter (great for breakfast), eggs, canned tuna, plain yoghurt, canned sardines, sunflower seeds… the list goes on.\n\n4. Bulk-buy (but don’t be fooled!)\n\nIt’s a well-known fact that bulk-buying can save you a lot of money. And healthy dish ‘fillers’ like canned beans, lentils, or brown rice, are often available in bulk quantities. But there are a few things to keep in mind.\n\nFirst, just because it’s a bulk deal doesn’t mean it would inevitably be cheaper. Do the math to see if it really works out cheaper. And if it is cheaper, there’s a second thing to keep in mind. You only save money if you end up using all the groceries you bought in bulk. In other words, if you buy perishable items and don’t use them before they spoil, you’re basically throwing money in the garbage bin.\n\nMake sure you buy non-perishable items in bulk, or even better, get a ‘bulk-buy buddy’. If you know of a friend that also wants to save money, team up and share the cost of great bulk deals. In this way you get the savings without risking the food items expiring.\n\nBe a deal detectiveDifferent supermarkets offer different deals, so make sure you know which deals are on offer when you go shopping. It’s not necessary to drive around looking for various deals (you’d just be wasting gas, which of course, costs more money!). Nowadays, most stores have their promotions online. So, compare your shopping list with the online promotions, and see if you can score a bargain!", "pred_label": "__label__1", "pred_score_pos": 0.6716359853744507} {"content": "Victor Nemo\n\nVictor Nemo was inspired by the paintings in his native country of Moldova. He became an self-taught artist after his frustration at the strict style of his academy and now paints his own style of mixed media art.\n\nVictor Colesnicenco grew up in Chisinau, the capital city of Moldova. This Eastern European nation is known for it’s rich artistic heritage. Nemo, as he is known to his friends, remembers being fascinated by the carvings and other craft works that surrounded him.\n\nIn particular he loved paintings, and from an early age he was determined to become an artist. Nemo began intense inquiry into the style and techniques of the famous painters. He was particularly impressed by the work of Ivan Shishkin and Salvador Dali. He enrolled in art school but did not enjoy the strict academic style of the Russian based academy. Knowing that a standard education was not for him, he abandoned it to pursue training on his own.\n\n\nRequest Commission", "pred_label": "__label__1", "pred_score_pos": 0.9946786165237427} {"content": "Merger and acquisition (M&A) transactions can be a viable alternative for accomplishing a number of strategic objectives in the context of building and realizing value for emerging growth and middle market companies (those from startup to several hundred million dollars in revenue).\n\nLet's take a high-level view of the buy-side and sell-side processes, and a framework for thinking about and planning each.\n\n\nIn many instances, the distinction between selling a company (i.e. an exit) and raising capital is measured by the amount of equity sold and the contractual rights obtained by the buyer. Financing growth raises the issue of long-term shareholder objectives, which many times involve eventual liquidity. As the wave of business transitions driven by baby boomers planning their legacy and succession continues, some shareholders are confronted with a multifaceted decision of how to finance the continued growth of their business, create liquidity for their owners, and lay the foundation for operations independent of the owner/founder.\n\nOthers see the opportunity to buy-out partners or create some liquidity while staying in the game for what may be deemed a second bite at the apple. This is the concept of selling a controlling interest in a company to a financial buyer (i.e., a private equity group) and rolling over or keeping a minority interest until a subsequent sale or liquidity event happens when the company is expected to have grown in value (under the watch of the new owners with their capital). There are numerous examples where the sale of the minority interest in the follow-on transaction (three to five years from the first transaction) resulted in as much economic gain as the original sale to the financial buyer.\n\n\n • Diversifying away the risk of having too much personal net worth in a single asset.\n • Minimizing the risk of growth by obtaining a financial or strategic partner.\n • Buying-out passive partners and making room in the capital structure for management and employees without dilution to exiting active shareholders.\n\nSeveral potential solutions exist including recapitalization, sale to a financial buyer while keeping a minority stake or an outright sale to a strategic or financial buyer with contractual rights for some level of future performance—and there are many variations.\n\n\nGenerally a recapitalization will involve a lower cash-out (as a partial exit or staged exit) for the active owners than a buyout (which involves a change of control). A recapitalization will most likely be focused on changing the relative mix of debt and equity with an eye toward the growth objectives of the company and the required go-forward capital. For example, a leveraged recapitalization will most likely increase the debt of the company in exchange for distributions, dividends or purchase of equity.\n\n\nAcquisitions can meet a number of goals if approached and executed as part of a long-term strategy. Some of the typical reasons executives pursue acquisitions include:\n\n • To accelerate revenue growth.\n • To enter an adjacent market space.\n • To expand into a new geography or obtain a physical footprint in a new location.\n • To access new customers.\n • To access technology.\n • To strengthen the pool of talent and capabilities.\n • To complete or augment a product or service line.\n • To reduce costs.\n • To capture market share.\n • To prevent a competitor from gaining these advantages.\n\nThe first phase of a typical acquisition process will address finding a target company to buy; this begins with the strategic plan that should lay the foundation to determine many of the parameters and the focus of the process. The second phase of the process is to structure the deal, close the transaction and integrate the business.\n\nThe financing strategy to support the acquisition should initially be thought of in the context of the overall acquisition process and be defined as part of the acquisition strategy (phase one), understanding that the process will evolve and is somewhat iterative as knowledge is gained from the marketplace. If your company is cash flush or the acquisition target is immaterial in value, the financing strategy may be as simple as funding the transaction from operational cash flow or cash reserves. However, if the deal requires external funding, management must consider a financing strategy, which typically begins with understanding the acquiring or buying company. This involves:\n\n • Determining its valuation and financial strength.\n • Establishing financial objectives and benchmarks for vetting possible acquisitions.\n • Determining parameters around how much the buyer can afford.\n • Conducting internal discussions around an ideal or preferred deal structure.\n • Establishing relationships with financing sources and obtaining buy-in regarding the acquirer's plans.\n • Obtaining evidence for potential sellers of the buyer's ability to finance and close a deal.\n\nFrom these parameters, management can then think about financing a specific target company, which is a function of the value of the target, likely cash flow of the target, the deal structure and the integration strategy.\n\nStart by assessing the value of the target acquisition as a stand-alone business using traditional valuation approaches; then value the acquisition in the context of your business giving consideration to cost savings and lift that may be obtained on a combined basis. Another metric that may be useful in the process is to determine the finance-able value. This is the amount that can be paid using external financing based on the assets and cash flow of the target.\n\nThe deal structure and financing strategy are developed by weighing a number of factors to find the optimum solution to meet the objectives of the parties involved. Among other things, these factors include the integration strategy and the valuation gap, that is, the value that your company is willing to pay and what is required to get the deal done.\n\nManagement should keep in mind some core concepts as it takes an objective view and embarks on the acquisition process:\n\n • Begin with the end in mind; set clear objectives and benchmarks to gauge attractiveness of potential target companies and particular deals.\n • Develop the financing strategy up-front and establish relationships with likely sources of financing.\n • Terms are likely more important than absolute valuation.\n • Align the financing strategy with the operating/integration plan and deal structure.\n • Focus on value creation.\n\nSimilar Processes for Each\n\nRegardless of the eventual solution or desired outcome, start with the same process. The essence of the front-end steps in the selling or financing process is analysis and understanding of the shareholders' and company's objectives, financial and competitive position, growth strategy and initiatives, and valuation.\n\nKeep in mind that whether selling the entire company or raising a tranche of growth capital (in the form of debt or equity), what you are really selling is the future cash flow of the business. While past performance provides credibility to management's claims, future cash flow is the foundation for valuation and usually the primary reason for buying or investing in a company.", "pred_label": "__label__1", "pred_score_pos": 0.5868865847587585} {"content": "Fleaman Barkus is a thrift store operated by the Humane Society of Independence County (HSIC). HSIC is a non-profit organization benefiting the homeless dogs and cats of Independence County by operating a low-kill shelter in Batesville, Arkansas. Fleaman Barkus serves as a means to raise funds for the sustainability of the HSIC.\n\nLooking for a fun way to give back to our Furry Friends? How about volunteering?\n\nYou can help sort the donated merchandise, organize the store, greet the customers, etc.\n\nJust fill out the VOLUNTEER FORM and someone will be in touch. Thank You!", "pred_label": "__label__1", "pred_score_pos": 0.9991068243980408} {"content": "jamie dimon\n\n“As a nation, we were clearly not equipped for this global pandemic, and the consequences have been devastating,\" Jamie Dimon wrote to shareholders.\n\"The good news is that it was caught early and the surgery was successful,\" bank executives said on Thursday.\nThe former law professor is taking notes and even assigning math homework. Wall Street better be paying attention.\nBillionaire CEO Jamie Dimon struggled to come up with a solution for an employee struggling to make ends meet on an entry-level wage at his bank.\nThe CEO couldn't explain to the California lawmaker how his own employee should deal with a $567 monthly shortfall.\nLeverage rules were supposed to be the last line of defense. Now even Democratic appointees are calling to weaken them.\nThe Future Investment Initiative conference is scheduled to begin Oct. 23 in Riyadh, Saudi Arabia.\nDimon is the latest high-profile cancellation after the disappearance of Saudi journalist Jamal Khashoggi.\nGary Cohn said the JPMorgan Chase CEO, derided last week by the president, has what it takes for the White House.\nDimon backtracked after saying he could beat Trump in a campaign.", "pred_label": "__label__1", "pred_score_pos": 0.8422209024429321} {"content": "What's Going on With China?\n\nStock markets around the world are cratering barely a week into 2016 and it seems like we are back in August of 2015 when the last correction took place. Once again, China stands tall amongst macro drivers, along with plunging oil prices.\n\nLast Wednesday China’s equity market closed early, down 7%, with trading halted within thirty minutes of the session opening as brand new circuit breaker rules (instituted in 2016) were triggered. This follows a similar halt on Monday. Chinese authorities are clearly scrambling, with their stock market regulator announcing on Thursday that it would be s uspending the circuit breaker rule , for now.\n\nSo what’s going on?\n\nIt mostly comes down to understanding what is happening with the Chinese yuan and credibility questions about Beijing and the People’s Bank of China (PboC). Chinese equity markets opened lower today after the PboC announced the yuan reference rate at a five-year low.\n\nBut some history may be helpful first.\n\nMoving to a managed floating rate system\n\nThe yuan was pegged to the US Dollar (at 8.28 yuan per USD) until July 2005 when the peg was lifted and revalued to 8.11 per USD, strengthening the currency by about 2%. The idea was to make trade in the currency simpler and efficient as China went from a fixed exchange rate system to a managedfloating rate system. The currency was allowed to float within a 1% band about the PboC’s peg to a basket of currencies. The bank however ignored the previous day’s trading when setting the midpoint fix (to the USD) for the next day.\n\nThe currency appreciated 21% to 6.83 per USD over the next three years. In August 2008 the global financial crisis prompted the PBoC to repeg the yuan to the USD and halt its appreciation as global demand waned.\n\nChina removed the dollar peg in June 2010 and the currency once again appreciated about 11% by the end of 2013 to about 6.05. Now even after all the appreciation between 2005 and 2013, the general consensus seemed to be that the currency was significantly undervalued, with US critics in particular accusing China of controlling its currency to give its companies an unfair advantage . Since the yuan would appreciate significantly against the dollar if allowed to float freely, China capped its rise by buying dollars and selling yuan – resulting in vast foreign reserves that peaked at $3.9 trillion in June 2014.\n\nA slowing global economy\n\nOver the past few years the US economy has strengthened while the rest of the world’s economies, including China, seem to have stalled. As a result the dollar has appreciated, not least because central banks in Japan and Europe embarked on implicit policies to devalue their respective currencies and boost exports. As an export-dependent economy, China could potentially join this “currency war” by simply relinquishing some control over its currency and letting the market devalue it. Of course, in theory China’s vast amount of reserves would allow it to step in at any point and prevent the yuan from falling too much.\n\nIn March 2014 the PBoC widened the yuan trading band around the daily fix to 2% (from 1%), allowing the currency to move up to 4% a day. By December 2014 the yuan spot price moved into the weak end of the trading band as markets tried to force the currency lower.\n\nMeanwhile Chinese economic data continued to show a slowdown, with exports shrinking 9.5% on the year in July 2015.\n\nCurrency reform or competitive devaluation?\n\nOn Thursday, August 11th 2015, China surprised global markets with a 1.86% devaluation in the yuan’s midpoint fix, their biggest such move since 1994. At the same time, an equally important announcement was a move to set the midpoint fix to reflect the previous day’s close, thus making the yuan dependent on daily trading.\n\nOstensibly, China’s goal was to allow market forces to have a greater role in its currency as a step toward making the yuan a global reserve currency. The IMF called it a “welcome step” even as it believed the currency to be no longer overvalued and was considering including it in its SDR basket (Special Drawing Rights). On November 30, the IMF agreed to add the Chinese yuan to its SDR basket in October 2016, citing the yuan’s role as freely usable currency .\n\nOn December 11 the PBoC again caught the world off guard, announcing that the yuan’s exchange rate will no longer be fixed to the USD, but instead to a basket of currencies that included the yen, euro, British pound but also the Russian rube, Thai baht, Malysian ringgit. As Nash and Wray discussed at the time, on the face of it the move looked like reasonable reform toward a more open capital account. However in practice the decision to depeg from the dollar could be interpreted as a move towards supporting a slowing economy and perhaps even regaining lost ground.\n\nOn January 6th 2016, the PBoC fixed the yuan to a fresh five year low at 6.53. The currency has fallen 6% against the dollar since July.\n\n\nWithout going into too much detail and adding to an already long post, I will point out that there is an “offshore” yuan as well, which is allowed to trade freely in Hong Kong. The offshore yuan typically trades at a discount to the onshore yuan and is also at its lowest level in five years, while the spread between the two versions is at a record level. The PBoC’s inability to narrow the spread, which it pledged to do last August as part of its goal to make the currency freely usable, raises concerns over their credibility.\n\nExporting deflation\n\nIrrespective of China’s motivations, the depreciating yuan could increase global currency tensions as China’s ailing companies strive to become more competitive at the expense of rivals in Europe and Asia. Note that China is still the world’s largest net exporter and is more dependent on the world than the other way around.\n\nThere are reports that the PBoC is under increasing pressure from policy makers to let the yuan fall quickly and sharply, by as much as 10-15%, as its recent gradual softening is thought to be doing more harm than good. The bank’s intervention has come at a cost. The PboC is spending billions of dollars of reserves to support a yuan under pressure even as economic growth is decelerating and capital flows reverse, with ordinary Chinese and businesses rushing to change yuan into dollars. FX reserves dropped by a record $107.9 billion in December and have fallen in every month but one since May as the next chart shows. Reserves have dropped 15% since June 2014, falling more than half a trillion dollars to $3.33 trillion in December.\n\nchina reserves m-m change\n\nAt first blush, it would seem that China has enough reserves to still maintain control over its currency. Nevertheless, as with any savings account, it gives you confidence until you start drawing it down.\n\nThe question no longer seems to be whether China is slowing – it is – but whether authorities can manage a “soft landing”? Till the past year, the answer seemed to be in the affirmative but confidence seems to be waning. Is China biting off more than it can chew, between managing its currency and starting global projects like the Asian Infrastructure Bank and the Belt and Road initiative ? All this in addition to the biggest task of them all: transitioning the economy from an export-based one to consumption-driven one.\n\nThe other question is whether China’s actions will unleash a wave of deflation across the world, even as the Federal Reserve appears to have embarked on a tightening path (expecting inflation to rise back to target).\n\nRisks from an imbalanced global economy\n\nIn the short-term, it remains to be seen how the various economies, and central banks, of the world fight deflationary pressures and stoke higher inflation. Or do they fall back on the American consumer as the last resort? This would not be an ideal situation for anyone.\n\nIn the years prior to the financial crisis, the rest of the world saved and bought American debt as consumers in the U.S. shopped, leading to huge imbalances in the global economy – the fact that some countries had large trade surpluses (exports larger than imports) and others (like the U.S.) with large trade deficits. In the years after the crisis, the hope was, or is, that countries (like China) that rely mostly on exports would transition to a consumption-driven economy. However, with the rest of the world’s economies remaining in stall speed and the U.S. dollar strengthening, American exports will continue to suffer even as another consumption binge looms, forestalling a more balanced global economy.\n\nIt would be ideal, even for the U.S. economy, if the rest of the developed world could reflate their economies while China and other emerging markets successfully manage to transition toward a consumption driven economies.\n\nIf not, the question becomes as to how long the U.S. can remain as an island of stability . Risks become enormous particularly if external headwinds creep onto U.S. shores and causes the economy to stall. The Federal Reserve does not too many tools left (other than QE and/or negative rates?). More crucially, the current political environment makes fiscal support less likely.\n\nIn a sense, the main macro story from 2015 continues into 2016 and we continue to monitor events carefully to see what the rest of the year will bring.", "pred_label": "__label__1", "pred_score_pos": 0.9341620802879333} {"content": "Meilleure façon d'assurer vos enfants!\nItems: 0\n0,00 €\nPanier vide\nLivraison à l'échelle\nService client\n\nMy baby cries in the car seat. What to do?\n\nIs your child constantly crying and you just can't seem to be able to silence the mewling? Whether it is a result of being colicky, moodiness or some other reason, these traditional techniques for comforting babies should help.\n\nPlaying soft music or singing to them in a soft, soothing voice.\nSwaddling provides the continuous touch and support present in the womb.\nShushing sounds imitate the continual sound made by blood flowing through arteries near the womb.\nSucking deeply affects the nervous system, triggering the calming reflex and causing the release of natural chemicals within the brain. It is therefore very advisable, that you bring a pacifier with you, if your child is still using it.\n\n\n\n\n© 2021 | Cookies\nORLANDO à partir Peru a acheté Concord Reverso Plus .\nNancy à partir USA a acheté BeSafe iZi Plus .\nAnella à partir USA a acheté Aquascale bath stand .\nClémentine à partir France a acheté Minikid 2.0 .\nClémentine à partir France a acheté Axkid Wedge .\nAli à partir United Arab Emirates a acheté Joie Spin 360 .\nChaitanya à partir Australia a acheté Joie Spin 360 .", "pred_label": "__label__1", "pred_score_pos": 0.5527976155281067} {"content": "Supermoon: 'Worm moon' to illuminate Monday night sky\n\n8 March 2020, 17:12\n\nLast year's worm moon rises in Kashmir\nLast year's worm moon rises in Kashmir. Picture: PA\n\nBy Megan White\n\nThe second supermoon of the year is set to light up the night sky and delight skygazers on Monday evening.\n\nIt is dubbed the “worm moon” and will be visible from 5.30pm.\n\nBut how did it get its name and where can you see it?\n\nA blue super moon rises over the City of London\nA blue super moon rises over the City of London. Picture: PA\n\nWhen and where can I see the worm moon?\n\nKnown as the \"worm moon\", the celestial event is expected to be visible from 5.35pm on Monday, after sunset, as the moon rises in the east.\n\nThis full moon will also be a supermoon, meaning it will appear about 14 per cent bigger and 30 per cent brighter in the sky as it reaches its closest point to Earth.\n\nThe moon will set in the west at sunrise on Tuesday morning around 7.13am.\n\nWhy is it called the “worm moon”?\n\nRoyal Observatory astronomer Emily Drabek-Maunder said: \"The March full moon is known as the worm moon, named after earthworms that emerge towards the beginning of spring as the ground thaws.\n\n\"Traditionally, monthly full moons are named from Native American tradition, but many also have Anglo-Saxon and Germanic origins.\n\n\"From those different origins, the March full moon has also been called the chaste moon, death moon, crust moon and even the sap moon after sap flowing from sugar maple trees.\"\n\nA super moon rises above the Shard\nA super moon rises above the Shard. Picture: PA\n\nWhy is called a “supermoon”?\n\nAccording to NASA’s Gordon Johnston, the term \"Supermoon\" was coined by the astrologer Richard Nolle in 1979.\n\nIn a blog post, he wrote: “It refers to either a new or full Moon that occurs when the Moon is within 90 per cent of perigee, its closest approach to Earth in a given orbit.\n\n“By this definition, in a typical year there can be 3 or 4 full Supermoons in a row and 3 or 4 new Supermoons in a row.\n\n“In practice, what catches the public's attention are the full Moons that appear biggest (and therefore brightest) each year.\n\n“For 2020, the four full Moons from February to May meet this 90 per cent threshold, with the full Moons in March and April nearly tied.\n\n“The full Moon next month will be slightly closer to the Earth (about 0.1 per cent) than this March full Moon.”\n\nHow long will it last?\n\nThe Moon will appear full for about 3 days.\n\nThe first supermoon event of 2020 occurred last month and the next one will take place on April 8.", "pred_label": "__label__1", "pred_score_pos": 0.9250573515892029} {"content": "Category Archives: mcafee\n\nMcAfee partners with ECS to offer MDR capabilities through MVISION EDR\n\nMcAfee announced that it is partnering with ECS to offer managed threat detection and response (MDR) capabilities through McAfee MVISION EDR. ECS is the first North American MDR partner for McAfee MVISION EDR and will leverage MVISION EDR and supporting vendors to deliver a scalable, repeatable and customizable program that enables organizations to focus on only verified threats. MDR solutions can help organizations by alleviating the customer challenges associated with alert fatigue, false positives, inexperienced … More\n\nThe post McAfee partners with ECS to offer MDR capabilities through MVISION EDR appeared first on Help Net Security.\n\nCyber Security Roundup for January 2021\n\nA suspected nation-state sophisticated cyber-attack of SolarWinds which led to the distribution of a tainted version the SolarWinds Orion network monitoring tool, compromising their customers, dominated the cyber headlines in mid-December 2020.  This was not only one of the most significant cyberattacks of 2020 but perhaps of all time. The United States news media reported the Pentagon, US intelligence agencies, nuclear labs, the Commerce, Justice, Treasury and Homeland Security departments, and several utilities were all compromised by the attack. For the full details of the SolarWinds cyber-attack see my article Sunburst: SolarWinds Orion Compromise Overview\n\nTwo other cyberattacks are possibly linked to the SolarWinds hack was also reported, the cyber-theft of sophisticated hacking tools from cybersecurity firm FireEye, a nation-state actor is suspected to be responsible. And the United States National Security Agency (NSA) advised a VMware security vulnerability was being exploited by Russian state-sponsored actors.\n\nAmidst the steady stream of COVID-19 and Brexit news reports, yet another significant ransomware and cyber-extortion attack briefly made UK headlines. Hackers stole confidential records, including patient photos, from UK cosmetic surgery chain 'The Hospital Group', and threatening to publish patient's 'before and after' photos. The UK cosmetic surgery firm, which has a long history of celebrity endorsements, confirmed it was the victim of a ransomware attack, and that it had informed the UK's Information Commissioner's Office about their loss of personal data.\n\nSpotify users had their passwords reset after security researchers alerted the music streaming platform of a leaky database which held the credentials of up to 350,000 Spotify users, which could have been part of a credential stuffing campaign. Security researchers at Avast reported 3 million devices may have been infected with malware hidden within 28 third-party Google Chrome and Microsoft Edge extensions.\n\nA McAfee report said $1 Trillion was lost to cybercrime in 2020, and companies remained unprepared for cyberattacks in 2021.\n\nStay safe and secure.\n\n\n\n What is GPS spoofing?\n\n  What is GPS spoofing?\n\n Global positioning system (GPS) technology is now the standard way for travelers to efficiently get from point A to point B. While GPS delivers unparalleled opportunities to businesses and individuals, there are some drawbacks to using this technology. GPS devices can be vulnerable to cyber attacks through GPS spoofing.\n\n GPS Spoofing 101\n\n Global navigation satellite systems (GNSS) have been around for years in many industrialized countries, and GPS is just one of those systems.   GPS spoofing happens when someone uses a radio transmitter to send a counterfeit GPS signal to a receiver antenna to counter a legitimate GPS satellite signal. Most navigation systems are designed to use the strongest GPS signal, and the fake signal overrides the weaker but legitimate satellite signal.\n\n Commercial Hazards of GPS Spoofing\n\n GPS spoofing isn’t to be confused with GPS jamming. GPS jamming happens when a cyber criminal blocks GPS signals altogether. Selling or using GPS jamming equipment that can block communications is illegal in the United States. While GPS jamming appears to be the greater threat, GPS spoofing delivers a sucker punch to a variety of businesses.\n\n GPS spoofing allows hackers to interfere with navigation systems without operators realizing it. The fake GPS feeds cause drivers, ship captains, and other operators to go off course without any coercion. Businesses that are particularly vulnerable to GPS spoofing are shipping companies, taxi services, and construction companies.\n\n Shipping Companies\n\n Shipping companies that haul freight via land, air, and sea all use GPS-based navigation systems to get cargo safely to destinations all over the world. GPS spoofing leaves these shipments vulnerable to hijacking and theft. A practical example of this is where hijackers use GPS spoofing to misdirect a vehicle to a location where its cargo can be robbed—and hid the truck’s location while it’s happening. Additionally, many shippers use GPS-enabled locks to secure their cargo, allowing them to open only when the truck arrives at its set destination. GPS spoofing undoes those locks as well. In all, this puts drivers in danger, and trucking companies lose millions of dollars of cargo each year due to hijacking incidents such as these.\n\n Taxi and Ride Sharing Services\n\n Gone are the days when taxi drivers relied solely on their knowledge of a city’s streets to transport passengers. Today’s taxi drivers can go into any city that their license allows and do their jobs efficiently with the use of GPS technology. This flexibility comes with some drawbacks, however. GPS spoofing allows drivers to fake their location and commit criminal acts while still on the clock. Drivers from ride services can also use the technique to fraudulently place themselves in surge areas to get more money for their services. Projecting a false location is a financial risk to companies and is potentially dangerous for passengers.\n\n Construction Companies\n\n While skilled construction workers are certainly valued, specialized tools, equipment, and machinery are the assets that many construction companies seek to track. These expensive assets commonly go missing on worksites, which eats into company profits. In recent years, GPS asset tracking systems have been installed to make sure construction equipment, tools, and machinery remain at authorized worksites. By using GPS spoofing, a thief could move an asset to a new location without anyone knowing about it until it was too late.\n\n Dangers of GPS Spoofing for Everyone Else\n\n GPS spoofing isn’t just a threat to businesses and government agencies; it also can be the catalyst for significant harm to individuals who rely on GPS. Cruising waterways along the coasts is a favorite hobby for those who enjoy boating.. Modern boats are equipped with GPS-based navigation systems. A cyber criminal can use GPS spoofing to get a skipper to steer his boat off course and into the path of danger from modern-day pirates.\n\n The makers of location-based dating apps tout them as a safe way to meet a potential mate. These apps use GPS technology to help users identify dates by their location. When a bad actor uses GPS spoofing, he can fake his location or guide his date to a dangerous location.\n\n The future of driving is now. Some electric cars are already equipped with an autopilot feature that offers unparalleled convenience to travel-weary drivers. However, independent research findings have uncovered a critical vulnerability in the cars’ navigation systems.  What will happen when fully autonomous, self-driving cars are made without steering devices that would allow a person to take control of their car during a GPS spoofing incident?\n\n Tips to Combat GPS Spoofing Attacks\n\n If you own a business that relies on GPS-based navigation systems, you’ll want to know the best ways to sabotage GPS spoofing attacks. The Department of Homeland Security points out some physical and procedural techniques to fight the problem. It recommends that companies hide GPS antennas from public view. GPS spoofing works well when an attacker can get close to an antenna and override legitimate GPS signals that come from orbiting satellites.\n\n The agency suggests installing a decoy antenna that’s in plain view of would-be cyber criminals. Adding redundant antennas in different locations at your site allows you to notice if one antenna is being targeted for GPS spoofing. Companies such as Regulus Cyber are also developing GPS spoofing detection software that alerts users of spoofing incidents and keeps their devices from acting on spoofed GPS data.\n\n Additionally, organizations should consider taking GPS-enabled equipment offline whenever connectivity isn’t actively required—thus making them less susceptible to attack. Likewise, following the basics of security hygiene provide further protection, such as regular updates and changing of passwords, along with the use of two-factor authentication, network firewalls, and other cyber defenses.\n\n GPS Spoofing for Privacy\n\n While GPS spoofing can cause big problems for people, businesses, and governments, there is a legitimate use for the practice. GPS tracking and location sharing present everyone with real privacy issues. GPS spoofing allows users to hide their actual location from those who could cause harm. Security companies can use GPS spoofing to guard high-profile clients or expensive merchandise. Individuals can install GPS spoofing apps for free on their Android phones to mask their locations and protect their privacy.\n\n\n\n\n The post What is GPS spoofing? appeared first on McAfee Blogs.\n\n What Security Means to Professionals\n\n What Security Means to Professionals\n\n Recently, we conducted a survey of 600 families and professionals in the U.S. to better understand what matters to them—in terms of security and the lives they want to lead online. The following article reflects what they shared with us, and allows us to share it with you in turn, with the aim of helping your workday go a little more smoothly.1\n\n How many windows are open on your computer right now? Check out your browser. How many tabs do you have? If it’s a typical workday, you’ve probably run out of fingers counting them up.\n\n Professionals put their computers through the paces. Consider the number of back-to-back meetings, video conferences, and presentations you lead and attend in a day, not to mention the time that you pour into work itself. Your computer has to keep up. It’s certainly no surprise that this is exactly the notion that came up in our research, time and time again.\n\n What’s on the minds of professionals when it comes to their security?\n\n In speaking with professionals about security, their answers largely revolved getting work done.\n\n • I need trusted apps and sites to work, always.\n • I need to maximize battery life while in transit or on a plane.\n • I need live presentations and demos to be seamless.\n • I need to multitask with multiple apps or multiple browser tabs open without locking up.\n • I need my computer to respond reliably and quickly without locking up.\n\n While on the surface this may mean performance is top of mind, a closer look reveals that performance is often a function of security. A quick and easy example of this is the classic virus infection, where getting a virus on your computer can bring work to a screeching halt.\n\n More broadly though, we see security as far more than just antivirus. We see it as protecting the person and helping them stay productive—giving them the tools to take care of the things that matter most to them. Thus, plenty of what we offer in a security suite focuses squarely on those concerns:\n\n Battery optimization keeps you working longer without fretting over finding an outlet in the airport or simply working without wires for longer.\n\n Password managers let you log into the apps and sites you count on without a second thought, also knowing that they’re securely stored and managed for protection.\n\n Vulnerability scanners make sure that your apps always have the latest updates, which ensures you have all the upgraded features and security protocols that come along with those updates.\n\n Inbox spam filters take yet another headache off your plate by removing junk mail before it can clutter up your inbox.\n\n Secure VPN keeps data safe from prying eyes on public Wi-Fi in places like airports, hotels, and coffee shops, which gives you more independence to work in more places knowing that your information is secure.\n\n Those are a few examples of specific features. Yet also important is that any security solution you use should your computer running quickly as well as smoothly. It should be lightweight and not hog resources so that your computer runs and responds quickly. (That’s a major focus of ours, where independent labs show that our performance is five times better than the average competitor.)\n\n Where can professionals get started?\n\n Drop by our page that’s put together just for professionals. We’ve gathered up several resources that’ll help you stay productive and safer too. Check it out, and we hope that it’ll keep you going whether you’re working on the road, in the office, or at home.\n\n Stay Updated \n\n\n\n • Survey conducted in October 2019, consisting of 600 computer-owning adults in the U.S.\n\n\n The post What Security Means to Professionals appeared first on McAfee Blogs.\n\n What Security Means to Elders\n\n senior using smartphone\n\n What Security Means to Elders\n\n\n Findings from Pew Research Center show that internet usage by elders has risen from an average of 14% in 2000 to 67% on average 2017. As these numbers continue to rise, we wanted to find out what was important to them—particularly as more and more of their lives go online.\n\n While many of us take shopping, surfing, and banking online for granted, they mark a dramatic shift for elders. They’ve gone from the days when banking meant banker’s hours and paper passbook to around-the-clock banking and a mobile app. And even if they use the internet sparingly, banking, finances, and commerce have gone digital. Their information is out there, and it needs to be protected.\n\n The good news is, elders are motivated.\n\n What’s on the minds of elders when it comes to their security?\n\n Most broadly, this sentiment captures it well: Technology may be new to me, but I still want to be informed and involved. For example, elders told us that they absolutely want to know if something is broken—and if so, how to fix it as easily as possible. In all, they’re motivated to get smart on the topic of security, get educated on how to tackle risks, and gain confidence that they go about their time on the internet safely. Areas of interest they had were:\n\n Identity protection: This covers a few things—one, it’s monitoring your identity to spot any initial suspicious activity on your personal and financial accounts before it becomes an even larger one; and two, it’s support and tools for recovery in the even your identity is stolen by a crook. (For more on identity theft, check out this blog.)\n\n Social Security monitoring:  Government benefits are very much on the mind of elders, particularly as numerous agencies increasingly direct people to use online services to manage and claim those benefits. Of course, hackers and crooks have noticed. In the U.S., for example, Social Security identified nearly 63,000 likely fraudulent online benefit applications in fiscal 2018, according to the agency’s Office of the Inspector General, up from just 89 in fiscal 2015.\n\n Scam prevention: An article from Protect Seniors Online cities some useful insights from the National Cyber Security Alliance and the Better Business Bureau. According to them there are five top scams in the U.S. that tend to prey on older adults.\n\n • Tech support scams are run by people, sometimes over the phone, that pretend to be from a reputable company, which will then ask for access to your computer over the internet, install malware, and then claim there’s a problem. After that, they’ll claim to “help” you by removing that malware—for an exorbitant fee.\n • Ransomware scams, where a crook will block access to your computer until you pay a sum of money. This is like the tech support scam, yet without the pretense of support—it’s straight-up ransom.\n • Tax scams that attempt to steal funds by instructing people to make payments to a scammer’s account. In the U.S., note that the IRS will not call to demand payment or appeal an amount you owe.\n • False debt collectors are out there too, acting in many ways like tax scammers. These will often come by way of email, where the hacker will hope that you’ll click the phony link or open a malicious attachment.\n • Sweepstakes and charity scams that play on your emotions, where you’re asked to pay to receive a prize or make a donation with your credit card (thereby giving crooks the keys to your account).\n\n Where can professionals get started?\n\n With that, we’ve put together several resources related to these topics. Drop by our site and check them out. We hope you’ll find some basic information and knowledge of behaviors that can keep you safe.\n\n Stay Updated \n\n\n\n\n The post What Security Means to Elders appeared first on McAfee Blogs.\n\n What Security Means to Families\n\n digital parenting\n\n What Security Means to Families\n\n One truth of parenting is this: we do a lot of learning on the job. And that often goes double when it comes to parenting and the internet.\n\n That’s understandable. Whereas we can often look to our own families and how we were raised for parenting guidance, today’s always-on mobile internet, with tablets and smartphones almost always within arm’s reach, wasn’t part of our experience growing up. This is plenty new for nearly all of us. We’re learning on the job as it were, which is one of the many reasons why we reached out to parents around the globe to find out what their concerns and challenges are—particularly around family safety and security in this new mobile world of ours.\n\n  Just as we want to know our children are safe as they walk to school or play with friends, we want them to be just as safe when they’re online. Particularly when we’re not around and there to look over their shoulder. The same goes for the internet. Yet where we likely have good answers for keeping our kids safe around the house and the neighborhood, answers about internet safety are sometimes harder to come by.\n\n\n What concerns and questions do parents have about the internet?\n\n The short answer is that parents are looking for guidance and support. They’re focused on the safety of their children, and they want advice on how to parent when it comes to online privacy, safety, and screen time. Within that, they brought up several specific concerns:\n\n Help my kids not feel anxious about growing up in an online world.\n\n There’s plenty wrapped up in this statement. For one, it refers to the potential anxiety that revolves around social networks and the pressures that can come with using social media—how to act, what’s okay to post and what’s not, friending, following, unfriending, unfollowing, and so on—not to mention the notion of FOMO, or “fear of missing out,” and anxiety that arises from feelings of not being included in someone else’s fun.\n\n Keep my kids safe from bullying, or bullying others.\n\n Parents are right to be concerned. Cyberbullying happens. In a study spanning 30 countries, one child in three has said they’ve been the victim of cyberbullying according to a study conducted by UNICEF. On the flip side of that, a 2016 study of more than 5,000 students in the U.S. by the Cyberbullying Research Center reported that 11.5% of students between 12 and 17 indicated that they had engaged in cyberbullying in their lifetime.\n\n Feel like I can leave my child alone with a device without encountering inappropriate content.\n\n If we think of the internet as a city, it’s the biggest one there is. For all its libraries, playgrounds, movie theatres, and shopping centers, there are dark alleys and derelict lots as well. Not to mention places that are simply age appropriate for some and not for others. Just as we give our children freer rein to explore their world on their own as they get older, the same holds true for the internet. There are some things we don’t want them to see and do.\n\n Balance the amount of screen time my children get each day.\n\n Screen time is a mix of many things—from schoolwork and videos to games and social media. It has its benefits and its drawbacks, depending on what children are doing and how often they’re doing it. The issue often comes down to what is “too much” screen time, particularly as it relates to the bigger picture of physical activity, face-to-face time with the family, hanging out with friends, and getting a proper bedtime without the dim light of a screen throwing off their sleep rhythms.\n\n Where can parents get started?\n\n Beyond our job of providing online security for devices, our focus at McAfee is on protecting people. Ultimately, that’s the job we aim to do—to help you and your family be safer. Beyond creating software for staying safe, we also put together blogs and resources that help people get sharp on the security topics that matter to them. For parents, check out this page which puts forward some good guidance and advice that can help. Check it out, and we hope that you’ll find even more ways you can keep you and your family safe.\n\n Stay Updated \n\n\n\n\n\n\n The post What Security Means to Families appeared first on McAfee Blogs.", "pred_label": "__label__1", "pred_score_pos": 0.5524563193321228} {"content": "Springe direkt zu Inhalt\n\nDina El-Sharnouby: New Social Movements: The Case of Youth’s Political Project in Egypt. Comparing the 1919 and 2011 Revolutions\n\n\n\nNews vom 31.10.2018\n\n\"With the 2011 Revolution in Egypt, new forms of social mobilization and new possibilities for political interaction surfaced. The manifestation of these events suggested a different understanding of politics among particularly revolutionary youth. How do their values and practices affect political imaginaries? How are those imaginaries different from previous revolutionary struggles? This article highlights the political projects of the 2011 revolutionary youth versus previous revolutionary struggles by looking at youth activists and the case of the leftist Bread and Freedom party. Contrasting the Revolution of 1919 to 2011 in Egypt reveals a renewed call to social justice imagined to be practiced through the state and state institutions while minimizing ideology and a singular leadership in their mobilization strategies. Drawing on fieldwork done in 2014 and 2015, this paper suggests that the 2011 political project from youth’s perspective is about the importance of political practices of social justice over an ideology.\"\n\n\n4 / 9", "pred_label": "__label__1", "pred_score_pos": 0.9257498383522034} {"content": "Gastric Ulcers\n\nWhat is it?\n\n\nWhat are the symptoms?\n\nThe clinical signs of ulcers are not noticeable in most horses. Of those horses clinically affected, the signs may include poor athletic performance, change in attitude, dull coat, altered eating behavior, weight loss, diarrhea and colic. In foals, teeth grinding (a sign of pain) and excessive salivation are common. Ulcers also occur in the first part of the small intestine (duodenum) and in the esophagus.\n\nWhat are the causes?\n\nUlcers are caused by a variety of factors including: diet and feeding management – feeding high levels of concentrates, feed deprivation and types of feeds (grass hay vs lucerne, lucerne is known to have acid buffering abilities), stress of training or disease, mechanics of training (splashing of acid in stomach while exercising) as well as medications such as corticosteroids.\n\n\n\nFeeding & Management:\n\n\n\nof volatile fatty acids (These are the high carbohydrate grains such as corn). Incorporate fat supplements to increase calories without excess grain.  Medications that decrease stomach acid production are available, but are only necessary in horses showing signs of clinical diseases or when the predisposing factors, such as stress, cannot be removed.\n\nRecommended Robank Feeds\n\nSignature Balancer, Weight Gain, Golden Years, Relax Equine, Showtime", "pred_label": "__label__1", "pred_score_pos": 0.5039302110671997} {"content": "Met Éireann has issued a Status Yellow low temperature and ice warning for all counties, with temperatures of -4C expected tonight, as the cold snap hitting the country this week continues.\n\nFreezing temperatures of between 0C and -4C are forecast, with the warning in effect from 5pm this evening until 11am tomorrow.\n\nThe forecaster has warned of ice forming on untreated surfaces, leading to treacherous conditions.\n\nA similar warning is also in place in the North for counties Armagh, Antrim, Down, Fermanagh, Tyrone and Derry from 2pm until midday tomorrow.\n\nTemperatures last night dropped to as low as -4.5C in some areas.\n\nSuch temperatures were seen in Mullingar (-4.5C), Oak Park in Carlow (-4.3C), and Casement Aerodrome in Dublin (-4C).\n\nThis morning, light sleet and snow spread southwards through the morning, with accumulations of snow in some areas.\n\nAA Roadwatch is asking motorists to reduce their speed as it can take ten times longer to stop a vehicle in snow or ice. Lying snow will very gradually melt today, leading to icy conditions as frost sets in very quickly after nightfall.\n\nGritting of main roads by local councils has been taking place to lessen the danger on routes where motorists must make essential journeys.\n\nTomorrow, there will be widespread frost and ice to start, with temperatures struggling to reach afternoon highs of just 3C, according to Met Éireann.", "pred_label": "__label__1", "pred_score_pos": 0.9363827705383301} {"content": "the action of leading a group of people or an organization.\n\n\"different styles of leadership\"\n\n08 Nov 2020 \n\n\nOnce an in-depth understanding has been developed, we can begin to concoct an evaluation, where the goal is to identify where change is needed. This includes identifying the company's strengths and weaknesses, as well as current and foreseeable problems.\n\n\nIn conclusion, S.N.Mushini consultants sole objective is identifying problems and opportunities, in order to develop solutions to problems and plans on capitalising on opportunities.\n\nSNM Consultants take pride in what they do and so, rather than working solely from within our office and doing online research, we take the extra step of touring the facility, meeting with the board of directors and employees, analysing the finances and reading all company materials.\n\nWhy we operate with this process, is so that our business consultant can uncover the details of a company's mission and what operations are in place.\n\n\n\nSocial Media Marketing Consultant\n\nBy creating a network across the globe between our consultants and clients, we will strive to continue meeting our clients needs and help their companies flourish.\n\nAs S. N. Mushini is built from a network of consultants, we show our respect and appreciation to one another. Valuing our members and fluidly encouraging the development of each person including rewarding their performance.\n\nWe aim to exhibit a continuous strong will to win in the consulting industry. Making an impact where ever we land.\n\nOur Consultants have worked with\n\n\nCredible Solutions\n\nFor Incredible Business\n\n( SNMConsulting)\n\n© 2019 S.N.Mushini LTD. is a UK private company limited by guarantee (“SNM”). SNM and each of its member firms are legally separate and independent entities. \n\n", "pred_label": "__label__1", "pred_score_pos": 0.8935784697532654} {"content": "Proper Salvia Care (Complete Guide)\n\nSalvia is a genus of plant that encompasses almost 1,000 species of shrubs, perennials, and annuals. Salvias are actually the largest genus in the mint family, Lamiaceae. The scientific name for sage, the popular kitchen herb, is Salvia officinalis. While not all varieties can be used to flavor your meals, most salvias make a colorful, perennial addition to your garden.\n\nMost salvia species are incredibly easy to care for. In addition, the variety of salvias allows you to choose a plant based on the condition of your gardens.\n\nDo you have full sun and well-drained soil? Salvia coccinea may work for you. How about partial shade and moist, boggy soil? Try planting some Salvia uliginosa!\n\nA border of perennial salvia is a common sight in the garden. With the height of salvias ranging from 12 inches to 5 or more feet tall, there is a variety that will fit well in any situation.\n\nGrowing salvia is simple, especially when you use the techniques and care recommendations that we have provided below.\n\nGeneral Care Guide\n\nThe care regimen for salvias is relatively simple. Adequate sun, water, and well-drained, fertile soil are all that most varieties require to thrive. Many salvias will perform well as perennials in USDA Hardiness Zones 5 through 9. Some varieties will survive the winters in zone 4, while other salvias can withstand the heat of summer in zone 10.\n\nThe bloom time of most perennial salvias is from late spring to fall. Some varieties are available that will start earlier or later in the season. Most salvia species are also referred to as “bush sage” because of their tendency to take the shape of small bushes.\n\nAmount of Sun\n\nMost salvia varieties enjoy full sun exposure, with about 6 hours of direct sunlight required to trigger flowering in the plants. Some varieties will tolerate partial or full shade, such as Salvia patens or Salvia roemeriana.\n\nWatering Frequency\n\nMost salvias enjoy well-drained soil. Salvias do not require excessive water during the summer growing season. As long as they are receiving at least 1 inch of rain per week, they should be happy. In addition, adding a 2 to 3-inch layer of mulch around the base of your salvias will aid in moisture retention and weed prevention. Most perennial salvias are drought tolerant and can handle adverse watering and garden soil conditions.\n\n\nIn early spring, apply a layer of compost or fertilizer around the base of each salvia plant. Lightly rake the compost into the soil and apply a 2 to 3-inch layer of mulch. Your salvias should not require another round of fertilization until next spring.\n\nPruning Salvias\n\nMost varieties of salvia die off and go dormant for the winter, although this will depend on the USDA Hardiness Zone and the type of salvia being grown.\n\nIf your salvias do go dormant, then pruning is hardly necessary. If you wish, you may prune the dead stalks as you please during the fall and use them as mulch. Any stalks that produce seed will have the possibility of introducing new salvias in the spring.\n\nMany gardeners choose to wait to prune their salvia plants until after the flowers have produced seed and died off. This allows the plants to reseed in the spring and also provides a source of food for your local birds.\n\n“Deadheading” is a popular pruning technique to achieve more flowering in salvia plants.\n\nDeadheading Salvias\n\nSalvia plants can be pruned during the flowering season with a technique called “deadheading”. The process involves removing the older, dying flower spikes to promote the new growth of stalks and blooms.\n\nIt is usually recommended to deadhead salvias by pinching the stalk off with your fingers. This allows the least amount of stress and damage to the plant, as long as care is taken not to pull or tug on the plant.\n\nIf the flower stalk is too strong to break with your fingers, cut flowers with pruning shears instead. Just be sure to disinfect the shears before use to prevent the spread of diseases among your plants. This is also the method of choice if you have a large number of salvias to deadhead.\n\nDividing Salvias\n\nSalvias can easily be divided if they are growing too large.\n\nEarly in the spring season, before new growth appears, dig up the roots. Divide the root ball into clumps and replant each individual clump. Cover each clump with 1 to inches of soil and a 1 inch layer of compost. Cover with a layer of mulch and water well. Continue watering every time the soil dries out until the plant becomes established. Each planted clump will become its own salvia plant that can then be divided in a few years’ time.\n\nThere are too many salvia varieties to list here, but we will cover a few of the most popular. Flower colors commonly range from bright red to purple to blue. Most varieties will bloom from early spring until the first frost, with the most blooms being present in mid-summer.\n\nSalvia coccinea, also known as scarlet sage, is known for its vivid red flower color. The plant is common in the Southeastern US and has grown popular in gardens worldwide. S. coccinea performs as a perennial in USDA Zones 9 and 10, as it can thrive in the summer heat. It propagates through reseeding in zones 6 through 8. It can be grown as an annual in colder zones. Scarlet sage can grow to around 3 feet tall and 2 ½ feet wide, performing as a small shrub in the garden.\n\nSalvia farinacea, also known as mealycup sage, produces blue flowers with the distinctive smell of sage. The flower stalks grow to around 3 feet, while the plant itself can spread around 2 feet wide. S. farinacea grows well as a perennial in zones 8 through 10 and can be grown as an annual in colder climates.\n\nSalvia elegans, also known as pineapple sage, is native to Mexico and Guatemala and features red flowers. It grows as a perennial in USDA Zones 8 through 10, enjoying full sun and a well-drained soil. However, it is tolerant to adverse conditions, including partial shade and drought. The red salvia plant can be grown as an annual throughout colder climates. Salvia elegans can grow to 4 feet in height and around 3 feet wide over the course of one growing season.\n\nSalvia elegans\n\nSalvia nemorosa, also known as the woodland sage, is native to Europe and Asia and features purple and blue flowers. The bush sage is popular with butterflies and hummingbirds, which lends to its use in butterfly and pollinator gardens. S. nemorosa grows in clumps around one foot in height and 1 ½ feet wide. The flower spikes can be cut back as they die off to encourage another round of blooms to take their place.\n\n‘Blue Hill’ salvia is one of the most popular cultivars (subspecies) of Salvia nemorosa, known for its bold blue flowers. It is one of the easiest blue salvia varieties to grow, as it is tolerant of adverse conditions like drought. Best of all, it is a vigorous flower producer and will light up your perennial garden with blooms of blue throughout the entire summer.\n\nSalvia nemorosa\n\n‘Violet Profusion’ salvia is another cultivar of Salvia nemorosa that has been bred to feature deep purple flowers. It otherwise performs the same as other S. nemorosa cultivars.\n\nSalvia greggii, also known as autumn sage, is a small shrubby plant with flowers that show shades of red, purple, and pink. The blooms of autumn sage are long-lasting and are known to attract hummingbirds.\n\n‘Hot Lips’ is a popular cultivar of Salvia microphylla. The bright red flowers of ‘Hot Lips’ salvia last from early summer until the first frost. ‘Hot Lips’ salvia can grow to a height of around three feet tall and will thrive in full sun. The red and pink flowers will last until early fall.\n\nSalvia microphylla\n\nDesign Ideas\n\nPerennial salvias are great plants to use in garden design. They provide a short and colorful border for the rest of your perennial garden.\n\nMost salvia varieties grow from one to three feet tall, providing a low border of beautiful blooms. Planting a variety of species can provide a nice mix of colors. For instance, ‘Hot Lips’ salvia, ‘Violet Profusion’ salvia, and ‘Blue Hill’ salvia could be planted in succession to create a pleasing array of color.\n\nSiberian irises can be planted directly behind the salvias, as the iris flower stalks will protrude above the row of salvia plants. Most irises grow to around 3 or 4 feet tall. Siberian irises are available in various colors, which can be used to create a rainbow of flowers during bloom time.\n\nOriental lilies would be a great plant to use in the back of your garden design, as the plants can grow to around 6 feet tall. They will provide beautiful blooms in the late summer or early fall, contrasting the early summer blooms of the siberian irises.\n\nPlease help share our content!\n\nThe Green Pinky\n\n\nNotify of\nInline Feedbacks\nView all comments", "pred_label": "__label__1", "pred_score_pos": 0.8869143724441528} {"content": "Women status in the 17th century essay\n\nPay only for approved parts History Research Paper:\n\nWomen status in the 17th century essay\n\nGet Full Essay Get access to this section to get all help you need with your essay and educational issues. Woman is the mother of mankind.\n\nHowever, despite holding such an important and unquestionable position in the society, the status and role of women have been outlined by men over millennia.\n\nVedas clearly suggest to us that women held a significant place in ancient culture. Despite all this, women were still treated like slaves back in the 17th century. Women were looked down upon and treated with less dignity.\n\nGet Full Essay\n\nA situation that has greatly changed today. Today, women have acquired equal heights with men. Men and women are competing in same platforms. Political offices and economic space are contested by both men and women Barton Women in the 17th century were greatly challenged with expressing themselves in a patriarchal system that had basically refused to grant merit to their views.\n\nWomen could not express themselves to address the conditions they were going through. The social structure of this period allowed women very limited opportunities for involvement; most if not all, served as managers of their households.\n\nThey were also responsible for curing bacon, making pickles jellies and preserves. They were expected to put their efforts into practical domestic pursuits as well as activities that inspired the betterment of their families, and particularly their husbands.\n\nWomen were kept very busy.\n\nWhat our customers say\n\nShe also kept bees and on top of it took goods to the market if especially if she was from the countryside. In big households, they took care of food and organized the servants and how they worked Barton Apart from being involved in the domestic activities, some women in this period also had a considerable education; especially the upper-class women.\n\nThe upper-class women were greatly educated. However, even though they went to good schools, they studied some certain disciplines.\n\nThere were disciplines that were definite for women. They learnt needlework, music, and dancing. They also learnt language skills and communication skills. Studies detail that they studied these kinds of courses so that they could not get derailed from their major chores.\n\nEven the courses they learnt were of much significance in their household duties. Some such as dancing were relevant when they had to entertain in different occasions. Therefore, though these women had access to education, the aim of their education was to ensure that they articulately and effectively attain their womanhood.\n\nA proper education for women in this period was viewed as that which gave much support to the domestic and social involvements but disregarded more of the academic pursuit Walsh Despite being limited to household activities, women continued to play very important but not acknowledged part in economic and political structures through their domestic roles.\n\nSome historic studies in women history suggest that this marked the beginning of change in women status. They add that this was unseen to many people.\n\nWomen participated in politics and economic affairs through their domestic roles. They acted as counselors in their homes. This was not clearly seen because they were able to participate in politics and economic issues through their roles in the family and community.\n\nTherefore, through this, they were able to influence the political system. Women found diverse ways of contributing to the society outside of the home. On the other hand, women from the noble class served as catalysts as well as donors in the maintenance of charitable hospices that ensured the welfare of many unfortunate individuals.\n\nThis still dictates the role and status of woman during the 17th century period Barton Political systems also perceived women as second-class citizens. They were subject to their fathers from birth. On growing up, they were later handed over like chattel to their husbands.\n\nWomen status in the 17th century essay\n\nThis was mutual across all the classes. They had to be submissive. It is for this reason that divorces were rare during this period.The representation of women in early 18th century England - Claudia Wipprecht - Term Paper - English Language and Literature Studies - Literature - Publish your bachelor's or master's thesis, dissertation, term paper or essay.\n\n\nWomen status in the 17th century essay\n\nRead our history research paper and buy any kind of papers. In 17th century Euro-America Puritan society believed that men played a patriarchal role upon women, and that this role was instituted by God and nature. The seniority of men over women lay within both the household and the public sphere.\n\nThe Role of Women in the 17th Century - In 17th century Euro-America Puritan society believed that men played a patriarchal role upon women, and that this role was instituted by God and nature.\n\nThe seniority of men over women lay within both the household and the public sphere. Women In The 17th, 18th, and 19th Centuries Essay - Women In The 17th, 18th, and 19th Centuries In the 17th century rich women would normally be taught at home by a tutor, they were taught subjects like Latin, French, Needlework, and how to converse, and they were also taught how to look pretty and to play instruments like the piano.\n\nMen utilized wealthy widows as a sort of stepping stone to gain status in the social system. For example, William Kendall, a former indentured servant, married his .\n\nWomen in 17th-century New England - Wikipedia", "pred_label": "__label__1", "pred_score_pos": 0.9290127754211426} {"content": "The domain within your query sequence starts at position 146 and ends at position 246; the E-value for the Cu_amine_oxidN3 domain shown below is 3.1e-14.\n\n\n\nPFAM accession number:PF02728\nInterpro abstract (IPR015802):\n\nAmine oxidases (AO) are enzymes that catalyse the oxidation of a wide range of biogenic amines including many neurotransmitters, histamine and xenobiotic amines. There are two classes of amine oxidases: flavin-containing ( EC ) and copper-containing ( EC ). Copper-containing AO act as a disulphide-linked homodimer. They catalyse the oxidation of primary amines to aldehydes, with the subsequent release of ammonia and hydrogen peroxide, which requires one copper ion per subunit and topaquinone as cofactor [ (PUBMED:8591028) ]: RCH 2 NH 2 + H 2 O + O 2 = RCHO + NH 3 + H 2 O 2\n\n\n\nThis entry represents one (N3) of the two N-terminal domains (N2/N3) that share a similar structure.\n\nGO process:amine metabolic process (GO:0009308), oxidation-reduction process (GO:0055114)\nGO function:quinone binding (GO:0048038), copper ion binding (GO:0005507), primary amine oxidase activity (GO:0008131)\n", "pred_label": "__label__1", "pred_score_pos": 0.9926946759223938} {"content": "Available Works\n\nAbove is a small selection of featured works from our collection.\n\nFor information about other available works by RETNA please contact the gallery at info@hgcontemporary.com.\n\n\n\n‘We are all in the gutter, but some of us are looking at the stars.’ ​-Oscar Wilde\n\n\nMarquis Lewis, known by his internationally-recognized tag RETNA, accesses spaces between typographic, text-based imagery and abstract esoteric states using a singular, mysterious script. \n\n\nEach block of text is a sophisticated system of hieroglyphs, calligraphy and illuminated lettering. With influences extracted from Arabic, Egyptian, Hebrew, Anglo-Saxon (or Old English) and Native American mythologies, RETNA's unique vocabulary communicates a personal form of poetry; one that reflects the harsh realities of urban life, while granting itself access to metaphysical considerations. RETNA employs ancient totemic symbologies as a baseline, overlaid with rhythms from the urban jungle. These are sourced from his youth in Los Angeles, born from Pipil (western indigenous El Salvadorian), Cherokee, Spaniard and African-American bloodlines. These subcultures factor into the physical product of his labors, often accompanied in the studio or on the street by a stream of sounds (whether it be music, ambient city noises or anonymous passers-by). It is this multimedia experience that is laid onto the painted surface for RETNA: auditory and visual content manifested in real-time.\n\n\nAs the dynamic of street art within the gentrified urban structure become increasingly blurred and complex, their foundational beliefs and symbols will take on new meanings. RETNA’s work reflects these changes with every successive project. Whether staging an international traveling exhibition appealing to the perpetually anonymous, high-roller commercial collector or showing alongside artists such as Keith Haring, Os Gêmeos, and Barry McGee on the famed East Village Houston-Bowery wall, RETNA’s ultimate aim is carefully concealed. One certainty, however, is his dedication to an artistic practice rather than abandoning principle for principal.\n\n\nRETNA’s language is markedly softer in tone and appearance than more traditional forms of street graffiti: the elegant swoops of ink-like letters and the poetic statements themselves seemingly adhere to messages of intellectual contemplation and restraint. RETNA’s use of a feather-tipped paintbrush owes to the airy movement of the characters. According to the artist, this conscious choice of material is also a nod to the Spirit of the Falcon, an ancient Egyptian totemic emblem signifying success and victory. A steady stream of references to victory and transcendence of worldly hardships reside in his work, perhaps in and of itself a collective plea from the depths of the streets to the canopy of fame and fortune. At the risk of delving too deeply into new-age philosophy or potentially alienating a base audience rooted specifically in urban environments, RETNA’s messages are masked in ciphers: words and meanings that are never immediately revealed nor capable of being accurately translated. Even those closest to him have only inklings of his gleanings in concrete form, as he continues to develop a dedicated language straddling the aesthetic borders of street art and academic-grade contemporary art.", "pred_label": "__label__1", "pred_score_pos": 0.9056415557861328} {"content": "Just like any software, it’s important to keep machine learning models secure during development and production stages. Learn more from Algorithmia.\n\nThere are security risks in software development of any kind, including machine learning. These risks must be taken into account during every phase of the machine learning life cycle in order to create a secure machine learning system.\n\nWhat is machine learning security?\n\n\nWhy is security important in machine learning?\n\nSecurity is important in machine learning because ML systems often contain confidential information or provide a competitive advantage to the organization that they would not want competitors to be able to access. Some companies use machine learning for security reasons to detect security breaches in other systems, so the security of that ML model itself is important so that their security system can be trusted to secure the other system.\n\nMachine learning security risks\n\nTo understand the importance of machine learning security and to know what precautions should be taken to avoid security issues, here are a few of the possible machine learning security risks. \n\nData confidentiality\n\nProtecting confidential data is already difficult without it being part of a machine learning system. ML brings additional challenges to protecting confidential data, since sensitive data is built into the model through training. There are effective but subtle attacks to extract data from an ML system are a potential risk. In order to protect your system from this type of attack, it is necessary to build security protocols into the model from the beginning stages in the ML lifecycle.\n\nSystem manipulation\n\nWhen a machine learning system continues learning and modifying its behavior while in operational use, it is said to be “online.” Experienced hackers are able to subtly move an online system in the wrong direction by feeding the system inputs that retrain it to give the wrong outputs. This type of attack is generally easy to carry out and subtle enough to be successful. Since this attack is so complex, ML engineers must consider algorithm choice, data provenance, and ML operations in order to properly protect the system.\n\nAdversarial examples\n\nOne of the most discussed attacks that threaten machine learning systems is known as adversarial examples. The idea of this attack is to fool the machine learning model by feeding it malicious input in very small nudges that cause the model to make false predictions or categorizations. Adversarial examples are very real and therefore need to be planned for in the ML security plan.\n\nTransfer learning attack\n\nA transfer learning attack is a risk when an ML system is built by fine-tuning a pretrained model that is widely available. An attacker could use the public model as a cover for their malicious ML behavior. If you use a transfer model, it should describe in detail exactly what the system does and what the creator has put in place to control the risks in their models.\n\nData poisoning\n\nSince data plays such a huge role in machine learning security, if an attacker can purposely manipulate the data used by an ML system, it can compromise the entire system. ML engineers should consider what training data an attacker could potentially control and to what extent they could control it, in order to give special attention to preventing data poisoning.\n\nSecuring your machine learning systems\n\nIn order to secure a machine learning system, it must be built into the model from the very beginning of the machine learning lifecycle. From the start of development through the production stages the entire time the model is in use, the system must be actively secured. \n\nAlgorithmia provides organizations with a machine learning framework that secures the model and data involved through every stage of the ML lifecycle. A flexible ML platform connects to all necessary data sources in one secure, central location for repeatable, reusable, and collaborative model management. Manage MLOps with access controls and governance features to secure and audit your ML models in production. Access control your model management system to reduce data vulnerabilities. Securely govern your machine learning operations with a healthy ML lifecycle.\n\nWatch a demo of Algorithmia to see how it secures the entire machine learning lifecycle.\n\nContinue learning\n\nChallenges of enterprise machine learning: a new ebook from Algorithmia\n\nBuilding versus buying an ML management platform\n\nAlgorithmia – securely govern your machine learning operations", "pred_label": "__label__1", "pred_score_pos": 0.997844398021698} {"content": "Home » mathematics » capital cost management mini case there are term\n\nCapital cost management mini case there are term\n\nResearch from Term Paper:\n\nFor organization B, the potential risks associated with cash flows happen to be higher than that for business A, and they are in the purchase of 11%, but nevertheless, the IRR around the cash flows is greater than the minimum required level of return of 11% making this investment also attractive. As these two projects happen to be mutually exclusive, and considering only IRR purchase selection criteria, purchase of organization B. with IRR of 14, 305% is more successful investment than purchase of business A with IRR of 13, 052%. The IRR method would not consider how big the initial investment necessary to achieve this rate of return around the cash runs and thus is not a perfect investment decision device, as typically higher preliminary investment require much higher bare minimum rates of return to motivate investor sacrifice this capital and get into the task.\n\nThe payback period shows the number of years it will require for a specific cash flow coming from investment to amount to first investment into this task. If the cash flows form the project happen to be constant in the time, the payback period formula is simply the result or perhaps the ratio of initial expense or capital spent to annual cash flows. Inside the subject case in point, the cash flows are not regular in time, plus the capital in the beginning spent is definitely subtracted from net twelve-monthly cash flows to approximate the year when the cash goes will break even. For company A, the payback period is 4 years, where already inside the 4th year the company can achieve $28, 174 over a initially spent amount. Intended for company M, the payback period is additionally 4 years, and in the 4th year of procedure the company can achieve $42, 236 over a initially spent amount. Seeing that both company A and B. require the same initial investment, organization B. is far more profitable and has better payback period. The payback period investment selection requirements is flawed by the reality it does not consider cash runs after the stop period, which may be much higher than for an investment project with lower payback period, but is not as rewarding in the longer term. Also, repayment period will not consider period value of money and thus the hazards associated with reaching the cash runs for different projects, and thus can favor immediate riskier projects over more long-term but sustainable job. On the other hand, repayment period is good investment collection criteria intended for the companies which may have tight capital requirements and need to retrieve their first capital pay out rather fast.\n\nProfitability index considers time value of cash flows to get achieved from your project plus the size of the original investment, this shows the NPV per 1$ put in into the job. For firm A, the NPV of cash inflows divided by primary investment is usually $1, 084, while it can be higher which is $1, 086 for the company B.\n\nAs stated above on the faults with payback period technique, discounted repayment period approach accounts for period value of money and is a better investment instrument. For company A, the discounted payback period is 5 years, and is likewise 5 years for business B, when is the net amount in present value left towards the company following recovering initial outlay, can be higher intended for company N.\n\nModified Interior rate of return is usually an investment instrument used for valuing investment jobs with difficult cash moves. Namely, it truly is applied if the cash goes “change their sign” over and over again. To compute the MIRR, it is necessary to understand the company financing rate, which is not applicable in this situation and so makes it impossible.\n\nBased on every one of the investment equipment applied, firm B. can be described as more worthwhile investment over company\n\n< Prev post Next post >\nCategory: Mathematics,\n\nTopic: Cash flows, Payback period,\n\nWords: 654\n\nPublished: 12.18.19\n\nViews: 503", "pred_label": "__label__1", "pred_score_pos": 0.6588085889816284} {"content": "Free Shipping On Orders Over $200\nSkillet - 8 Inch\nSkillet - 8 Inch\nSkillet - 8 Inch\nSkillet - 8 Inch\nSkillet - 8 Inch\nSkillet - 8 Inch\nSkillet - 8 Inch\n\nSkillet - 8 Inch\n\n\nSay hello to the 8” Cast Iron Skillet you won’t want to go without. Complete with comfortable grip handle, dual pour spouts, and iconic heat dispensing technology. Increased steel means no cracking or breaking with rapid temperature change, and 15% lighter weight than similar cast iron products. Pre-seasoned with natural, organic oils so it’s ready to use right out of the box with your stove, oven, or on an open-fire.\n\nSavor each flavor. Love each and every meal. Welcome to Cast Iron Skillet perfection.\n\n\nErgonomic, heat-dispersing, comfort-grip handle\nDual pour spouts for left or right pouring\nLimited lifetime warranty\n\n\n\n21.5cm x 39.5cm x 4.06cm\nSKU: CKW-301\nWeight: 2.7kg\n\n\nQ: Where is your cast iron made?\n\n\n\n\nBarebones is a Certified B Corporation, a designation we take seriously. As such, we ensure that our commitment to safe, ethical, and sustainable practices is upheld by each company and artisan that touches our products, without exception. We inspect each facility and company regularly and work only with those organizations that are as committed as we are to the highest of environmental and human standards. You can be confident that no matter where in the world your Barebones product was crafted, you are personally contributing to conscientious trade.", "pred_label": "__label__1", "pred_score_pos": 0.9938846826553345} {"content": "Friday, August 21, 2020\n\nBrief History Of The Dominican Republic Essay free essay sample\n\n, Research Paper THE DOMINICAN REPUBLIC EXPERIENCED numerous turns around in transit to the just framework under which it worked in the late eightiess. The state did non loll full independency until 1844, when it rose up out of 22 mature ages of business by Haiti ; this discharge came in this way than that of most Latin American states. Reacceptance of Spanish guideline from 1861 to 1865 exhibited the popular government # 8217 ; s uncertainty and dependance on bigger forces to ensure it and to indicate its position. Dominican presentation to mediation from abroad was other than made clear by the United States military business of 1916-24 and by an increasingly constrained activity by United States powers during a short considerate war in 1965. Strategically, Dominican history has been characterized by an about continuous rivalry for mastery among caudillos of dictatorial ideological solid convictions. Political and provincial rivalry covered, as it were, on the grounds that predominantly preservationist pioneers from the South and the E set themselves in opposition to gener partner increasingly wide figures from the northern bit of the Valle del Cibao ( the Cibao Valley, ordinarily called the Cibao ) . We will compose a custom paper test on Brief History Of The Dominican Republic Essay or on the other hand any comparable subject explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page Conventions of personalism, militarism, and cultural and monetary elitism secured the state in decennaries of exhausting wars, alliances, and absolutism that depleted its assets and sabotaged its endeavors to set up wide established guideline. In the late eightiess, the popular government was all the while battling to rise up out of the shadow of a definitive Dominican caudillo, Rafael Le nidas Trujillo Molina ( 1930-61 ) , who rose up out of the military and held about supreme force all through his guideline. The clear constitution of a popularity based system in 1978 was a promising advancement ; all things considered, the perseverance of majority rules system gave off an impression of being firmly connected to the state # 8217 ; s monetary fates, which had declined consistently since the mid-1970s. As it had since its commencement, the republic kept on battling with the idea of its local political relations and with the meaning of its monetary and political capacity in the more extensive universe.\n\nSunday, July 12, 2020\n\nMaking Diagnostic Essay Examples Written in the First Person Easy to Write\n\nMaking Diagnostic Essay Examples Written in the First Person Easy to WriteYour diagnostic essay examples should be original and well written. You want to be able to create the title for your diagnostic essay. Many times you may have a title you can use for a short story, but if you are writing a text that is going to be used for one to many pages then you will want to make sure that you have your own title.Your diagnostic essay examples should be written in the first person. You will need to describe your title as if you were to give it to someone to read. When you write your diagnostic essay examples, it is best to use second person pronouns such as 'I', 'he', 'she', or 'it'? This will help your reader feel like they are being talked to rather than just reading a text.In addition to your diagnostic essay examples being written in the first person, you will also want to tell about things you are not. What does it mean to be male or female? How do you define masculinity or femininity? How do your family structure and religion influence how you live your life? All of these things that you are not should be included in your diagnostic essay examples.Before you write your diagnostic essay example, you should take some time to think about what it is you want your reader to learn from the text. It should be something that will help them with their lives, education, and progress. These types of thoughts will help guide you when you are writing your diagnostic essay example.Another reason that your diagnostic essay example should be written in the first person is because you will be describing something that happened to you. This is why you are writing in the first person. You are taking responsibility for the events that happened to you and the details that come along with that.Writingyour diagnostic essay example in the first person will allow you to actually listen to what you are writing. You should have a good idea of what the subject matter is before you start wr iting your diagnostic essay example. You may even have an idea of the type of subject that you want to talk about.You should be comfortable and relaxed when you write your diagnostic essay example. This will allow you to be more creative with your subject matter. You should be able to talk about things that are emotionally charged. By writing about your experiences in this way you will be able to give your reader some more information on what they can expect from the subject.The key to writing a good diagnostic essay example is to be able to get inside of your reader's head. You should be able to tell about the things that they would not normally hear or read about on a daily basis. You will find that the diagnostic essay examples will come easily to you as you write your diagnostic essay examples.\n\nWednesday, May 20, 2020\n\nMy Interaction With Nature Of The Environment Essay\n\n10/07/2016 Astrobiology and Its Relation to the Environment I grew up in a fairly average Los Angeles suburb, so I don’t have the tight knit connection with nature that some from more rural locations might have. My interaction with nature in my early years was quite limited. I went on a few hikes with my family and occasionally went to the beach. But the one aspect of nature I’ve always been fascinated with is space. While this may not be what most of us think of the â€Å\"environment†, it has deeply impacted the way I see the world. What initially got me interested in the subject was when Pluto lost its status as a planet. I was only eight at the time, but I had an incredible teacher, Mr. Reefman, who spent a whole day on a lesson about Pluto and why the changes were made. This may have sparked a latent interest I’ve always had, and ever since I’ve been focused on Astrobiology. This specifically is the study of potential life in space and how humans may one day be able to settle on a foreign body. This even effected what major I picked, which is Biology, and the fact that I’m planning to go to graduate school for either astrophysics or astronomy. During the time I’ve been interested in Astrobiology, though, I’ve learned about the reasons why it’s vital for the future of humanity. And in conjunction with learning about the stars I also wound up learning about how fragile our own planet is. This led me to develop the idea that Astrobiology should be taught in schools becau seShow MoreRelatedPsychology : Nature Vs Nurture869 Words   |  4 Pagesbeen mainly geared towards discovering parts of the brain, and the environment that influences our behavior as individuals. In other words, research aims to provide reasons why people behave the way they do, and what makes individuals different from each other. Much to the joy of experts in the field, major strides have been made in not only understanding, but also predicting human behavior. Concepts such as the influence of nature versus nurture on personal development, introversion or extroversionRead MoreNature Vs Nurture : Nature And Nurture928 Words   |  4 Pagesmentioned briefly in my self-introduction post, the nature-nurture portion of our textbook is the one part of this course I stated I looked forward to the most. I have always found myself engaged in a constant internal battle regarding nature versus nurture. Adding to this internal battle is the fact that I am married to an identical twinâ₠¬ ¦a twin who drastically differs from his brother in several ways. These differences between my husband and his twin have resulted in my questioning if the geneRead MoreThe Child s Home And School Life1477 Words   |  6 Pageshow the home and classroom environments foster, create, and hinder the growth of my intellectually gifted student, it is important to consider the different relationships in the child’s home and school life. Urie Bronfenbrenner created the ecological model of human development in which he considered the relationships of the child’s different environments as a part of their development (Bronfenbrenner, 1994). The microsystem is composed of the relationships and interactions that the child directlyRead MoreAnalysis Of On Habit And Adam Gopnik1550 Words   |  7 Pagesand their interaction with our surroundings. The kind of action that occurs as two or more objects be it living or non-living have an effect upon one another is called interact ion. The idea of a two-way effect is essential in the concept of interaction and also how much we interact and to what degree is also influenced by multiple factors. Both Alain de Botton, the author of â€Å\"On Habit† and Adam Gopnik, the author of â€Å\"Bumping into Mr., Ravioli† talk about our interaction with our environment and howRead MoreThe Theory Of Human Development1060 Words   |  5 Pagesforces, memories, and conflicts that are usually unconsciousness† ().Following, the behavior perspective emphasizing on the observable behaviors and â€Å\"outside stimuli from the environment†. () This approach believed that the â€Å\"full understanding of development is by carefully studying the stimuli that composed the environment†. (pg15). ______The cognitive approach examines the root of understanding and it â€Å\"focuses on the process that allow people to know, understand, and think about the world. (p17)†Read MoreThe Traits Of Non Human Primates1662 Words   |  7 PagesGorillas), I try to find out their characteristics, pattern of their behavior, and differences between these two primate species. Especially, characteristics and behavior such as social interaction, food acquisition and intelligence will be discussed and compared in this paper. In order to enhance the persuasiveness of my observation, I recorded and examined at least 25 distinct characteristics of both Common Squirrel Monkeys and Western Gorillas. It is also helpful for me to compare these two primatesRead MoreNature Vs Nurture Essay1416 Words   |  6 PagesPsychologically, nature can be termed as the genetic predispositions impact on human traits. Nurture on the other hand, refers to the influence that learning has on the behavior of pers ons. The influence of learning is exclusively obtained from the environment. Scholars and lay people continue to argue about whether the strengths and weaknesses of people are as a result of their inherited traits or the ones acquired through learning from the environment. Great social implications have been drawnRead MoreBiomolecules In Biology1739 Words   |  7 Pagesfascinated in understanding about the ecological and biological processes of aquatic organisms and their interaction with the environment, especially their response and impacts of greenhouse gases. My past research focused on methods development for detecting and quantifying key elements and chemical compounds that actively influence the growth and distribution of aquatic organisms, and their interaction to environmental change. Environmental proteomics, genomic and biochemical studies in the biomineralizationRead MoreThe Between Undergrad And Grad Essay1067 Words   |  5 Pagesno need to be competitive with peopl e in the program because we are all exploring different topics as we discover our niche. Peer Demographics. During my undergrad, my peers were more or less my same age and had similar backgrounds. In contrast, in grad school the age and experience level of my peers significantly varies. Like myself, some of my classmates are younger and new to the professional world whereas others are more seasoned with 20 plus years under their belt. Despite these differencesRead MoreThe Complex Nature Of The Nursing Profession1601 Words   |  7 PagesIn my relatively short tenure as a nurse I have come to understand and firmly believe that the nursing profession is widely misinterpreted and sometimes viewed by the public as a systematic, task driven, emotionally simplistic and withdrawn profession. When in reality the nursing profession’s complex nature requires those involved to stay current, active and embracing a dynamic approach to their interactions. A dynamic nature is required in order to be successful in nursing, as adaptive change,\n\nWednesday, May 6, 2020\n\nApplication Of Feminist And Family Violence - 2664 Words\n\nApplication of Feminist and Family Violence Janine Latus’ If I am Missing or Dead is a true story that incorporates various aspects of both family violence theory and feminist theory. Although one could argue that overall, the story emphasizes many more aspects of a family violence theory, aspects of the feminist theory are undeniably present throughout the book as well. To begin, family violence theory can be seen throughout Latus’ memoir in Janine’s relationship with Michael, her relationship with Kurt, and within Amy’s relationships with Ron Ball and Jim. As family violence theory states, family violence occurs because of societal causes, individual influencing factors (mental illness, substance abuse), and family level causes (Stalans, 2015). Stressful changes and time spent together, for instance, impact violent occurrences according to family violence theory. We see this first in Janine’s relationship with Michael. On their ski trip together, increased time together leads to high-tension levels, and soon a comment by Janine leads to a vicious beating at the ski resort (Latus, 147). Later, this is concept is reiterated in her relationship with Kurt, as by the time J. Latus and Kurt are married and living together, the violent/aggressive occurrences begin to increase. Kurt begins getting in Janine’s face with rage- even when the children are present, he reads her e-mails, and frequently accuses her of flirting with other men on a regular basis, all of which areShow MoreRelatedContributions of Feminist Sociologists to the Study of Family Life1255 Words   |  6 PagesContributions of Feminist Sociologists to the Study of Family Life What Is Feminism? In my heart, I think a woman has two choices: either shes a feminist or a masochist. - Gloria Steinem There are three types of feminism - Marxist, Radical and Liberal. All feminists believe in gender socialization, although they all blame different groups of people for women being treated the way they do. Marxist feminists blame society or capitalism, radical feminists blame menRead MoreFeminism : A Feminist Perspective1168 Words   |  5 Pageseye-opening articles, groundbreaking books, and activism has influenced my intellectual journal through feminist theory. Feminism is a contentious topic with matters that pertain to contemporary feminism, including the following: reproductive rights; equal access to education and employment; marriage equality; violence against women; and the sex trade. While these are only a few of the issues faced by feminists, it is evident that feminism has great value in today’s society. My journey with feminism beganRead MoreApartheid: Theory and Practice During the Apartheid era the international media that highlighted1300 Words   |  6 PagesApartheid: Theory and Practice During the Apartheid era the international media that highlighted the unsteady political situation in the country, stressing the political violence and unsteadiness that South Africans had suffered often depicted South -Africa rather pessimi stically. Since the end of the Apartheid policy of racial segregation and with the formation of a new government of national unity, South Africans have sought to build a new, multi-cultural or rainbow nation where the skin colorRead MoreFamily Violence Essay6096 Words   |  25 PagesFamily violence is not a new phenomenon, as it has essentially existed since the beginning of time. Only in modern times, however have societies begun to recognize violence and family members as a social problem (Barnett, Miller-Perrin Perrin, 2005). For many years, the social problem of family violence had not only been heavily ignored, but for a number of years, had not been fully understood. For example, family violence takes many forms and has a number of different names. Family violence, alsoRead MoreAssessment of the Usefulness of Functionalism in Understanding the Family1223 Words   |  5 PagesUsefulness of Functionalism in Understanding the Family Functionalism is a structuralist theory. This means it sees the individual as less important as the social structure of society. It is a ‘top down’ theory. The family can be defined as an intimate domestic group composed of people related to each other by blood, sexual relations and legal ties. When assessing how useful functionalism is when looking at the family, other views/perspectives need to be taken intoRead MoreA Radical- Socialist Feminism with a Postcolonial Approah Essay1260 Words   |  6 Pagesfeminism. After reading Tong (2009) on various feminist theories, I have come to see the different feminist theories in a continuum of the feminist movement. Therefore, these theories cannot be boxed into clear-cut categories that share nothing in common with each other. I will attempt to formulate my own feminist theory using the previous works of feminist scholars as my foundation. In order to explain the application of this theory, I will illuminate a feminist issue. Further, I will present ways to tackleRead MoreChile, A South American Country1496 Words   |  6 Pagesthose 18 million people, 11 million are just consisted of women population. Ever since, Ferdinand Magellan, the first European to set foot on what is now called Chile, women have been neglected of many of their rights. Facing domestic violence and gender-based violence, there are only a few thi ngs that the government â€Å\"approves† Chilean women doing. Chileans have experienced a leftist government of Salvador Allende to a military dictatorship of Augusto Pinochet also known as General Pinochet. With allRead MoreDefining Intimate Partner Violence ( Ipv )1889 Words   |  8 PagesDaily, families are facing issues that bring challenges to the home regardless if it s violence or not. There are issues such as intimate partner violence (IPV) also known as domestic violence that at times are not reported until it is very late. The Centers for Disease Control and Prevention defines intimate partner violence (IPV) as physical violence, sexual violence, stalking and psychological aggression (including coercive tactics) by a current or former intimate partner (i.e. spouse, boyfriend/girlfriendRead MoreDomestic Violence And Immigrant Women1274 Words   |  6 PagesThe student documentary video regarding domestic violence and immigrant women highlighted a significant healt h and a human right problem all over the world. Violence is defined by the World Health Organization as the intentional use of physical force or power, threatened or actual, against oneself, another person, or against a group or community, which either results in or has a high likelihood of resulting in injury, death, psychological harm, male-development, or deprivation† (WHO 2002:4). AccordingRead MoreThe On The Gender Machinery1638 Words   |  7 Pagesconflict had on women and children. The program endorsed gender sensitivity in managing girls and women victims’ statements whilst additionally building skill sets for conversing with these women and the distressed witnesses (kjkljklj). In 2006, 34 Family support units provided legal and psychological counselling, emergency health services for the surviving women and girls of GBV during the war. Leading to convictions for â€Å\"forced marriages† of girls and women to RUF men. These convictions occurred\n\nGreat Gatsby Outline free essay sample\n\nNick was invited to party at Gatsby’s place. There, Nick meets up with Jordan Baker and Gatsby. Nick was surprised to meet Gatsby because he had been looking for him at the party all night. Gatsby spoke with Jordan alone and talked for hours, but Jordan was not allowed to tell anyone about their conversation. When everyone was trying to leave the party there was a car accident. Nick discovers that he is not in love with Jordan and finds out that she is a liar. II. Character a. Gatsby- a party host and Nick’s neighbor. He is also Daisy’s lover. b. â€Å\"There’s something funny about a fellow that’ll do a thing like that, he doesn’t want any trouble with anybody† (Fitzgerald 43). c. This is a significant quote because it shows that Gatsby is sneaky and he is hiding something. Later the party quests said that he killed a man or he was a German spy in the war. We will write a custom essay sample on Great Gatsby Outline or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Gatsby seems to have a mysterious past. d. Best Quality- Gatsby is good at choosing his words wisely. Worst Quality- He has a bad reputation and tends to make people wonder about him. e. Gatsby is obviously the main character in The Great Gatsby. He interacts with the narrator and with many of the other characters. Everyone knows of Gatsby but doesn’t know anything about him. He manages to stay mysterious and keeps his business to himself. He is the type of character that makes you want to continue reading the book. III. Meaningful Quote a. Sometime before he introduced himself I’d got a strong impression that he was picking his words with care† (Fitzgerald 48). b. Nick is implying this quote towards Gatsby. This quote tells us that either Nick can read people well, or Gatsby is obvious when he is trying to hide something. IV. Symbol Analysis a. The gas blue dress with lavender beads symbolizes Gatsby’s wealth. b. Gatsby’s lack of appearance at the party symbolizes is mysteriousness. Who wouldn’t make much of an appearance at your own party?\n\nThursday, April 23, 2020\n\nThe Essays - HIVAIDS, Glycoproteins, Lentiviruses, T Cells\n\nThe Immunology of Aids Introduction Although HIV was first identified in 1983, studies of previously stored blood samples indicate that the virus entered the U.S. population sometime in the late 1970s. Worldwide, an estimated 27.9 million people had become HIV-infected through mid-1996, and 7.7 million had developed AIDS, according to the World Health Organization (WHO). AIDS is a disease of the immune system, and is caused by Human Immuno deficiency Virus (HIV). HIV targets and infects T-helper cells and macrophages. After infection, replication of the virus occurs within the T-helper cells. The cells are lysed and the new viruses are released to infect more T-helper cells. The course of the disease results in the production of massive numbers of virus (1 billion/day) over the full course of the disease. The T- helper cells are infected, and rapidly destroyed both by virus and by cytotoxic T cells. T-helper cells are replaced with nearly a billion produced per day. Over many years (average may be 10), the T-helper cell population is depleted and the body loses its ability to mount an immune response against infections. Thus, we mount a very strong immune response against the virus for a long time, but the virus is produced at a very high rate and ultimately overcomes the ability of the immune system to respond. Since HIV belongs to a class of viruses called retroviruses, it has genes composed of ribonucleic acid (RNA) molecules. Like all viruses, HIV can replicate only inside host cells, commandeering the cell's machinery to reproduce. However, only HIV and other retroviruses, once inside a cell, use an enzyme called reverse transcriptase to convert their RNA into DNA, which can be incorporated into the host cell's genes. HIV belongs to a subgroup of retroviruses known as lenti-viruses, or slow viruses. The course of infection with these viruses is characterized by a long interval, up to 12 years or more, between initial infection and the onset of serious symptoms. Like HIV in humans, there are animal viruses that primarily infect the immune system cells, often causing immuno-deficiency and AIDS-like symptoms. Scientists use these and other viruses and their animal hosts as models of HIV disease. The CDC currently defines AIDS when one of 25 conditions indicative of severe immuno-suppression associated with HIV infection, such as Pneumocystis carinii pneumonia (PCP) is present, or HIV infection in an individual with a CD4+ T cell count less than 200 cells per cubic millimeter (mm3) of blood. However, the question that now remains to be answered is 'How does HIV effectively overcome the human immune system?' In this paper I will try to answer this question. In the first chapter I will explain how HIV is transmitted and what its life cycle looks like. This in order to increase the understanding of how the virus operates. It can be seen as an introductory chapter to the main body of the paper, chapter 2. In the second chapter the specific interactions between the virus and the human immune system will be discussed and shown why its is so threatening. In the last chapter I will deal with certain promising treatments against AIDS. Chapter 1 The Transmission of HIV Among adults, HIV is spread most commonly during sexual intercourse with an infected partner. During sex, the virus can enter the body through the mucosal linings of the vagina, vulva, penis, rectum or, very rarely, via the mouth. The likelihood of transmission is increased by factors that may damage these linings, especially other sexually transmitted diseases that cause ulcers or inflammation. Research suggests that immune system cells called dendritic cells, which reside in the mucosa, may begin the infection process after sexual exposure by binding to and carrying the virus from the site of infection to the lymph nodes where other cells of the immune system become infected. HIV also can be transmitted by contact with infected blood, most often by the sharing of drug needles or syringes contaminated with minute quantities of blood containing the virus. The risk of acquiring HIV from blood transfusions is now extremely small in Western countries, as all blood products in these countries are screened routinely for evidence of the virus. Almost all HIV-infected children acquire the virus from their mothers before or during birth. The anatomy of HIV HIV", "pred_label": "__label__1", "pred_score_pos": 0.9264587759971619} {"content": "CPM Homework Banner\n\nConsider and .\n\n 1. Use any method to determine the points of intersection of and .\n\n One method is to graph and on the same set of axes and locate the point of intersection.\n\n To graph , make a table. You will need to use -values from  to .\n\n To use the equations, set  and solve the resulting quadratic equation.\n\n Another method would be to make a table of values for each function and compare table values to find matches.\n\n Two points of intersection: and .\n\n 2. What is\n\n\n\n 3. What is\n\n How is this different from\n\n Remember to put parentheses around and use the Distributive Property correctly.\n\nUse the blank graph in the eTool below to solve the problem.\nClick the link at right for the full version of the eTool: Int3 1-80 HW eTool", "pred_label": "__label__1", "pred_score_pos": 0.562828540802002} {"content": "Key terms and Spelling List - Year 11 Music\n • Area of Study 3: Music for Stage and Screen: Star Wars\n Test yourself\n Diegetic MusicMusic that is heard by both the characters in the film and the audience watching the film. \n UnderscoreMusic that is heard quietly under spoken dialogue in a film.  \n LeitmotifA recurring theme or musical idea that is used to represent a character or place in the film.  \n FanfareA grand opening to a piece usually performed by a Brass section.  \n Quartal HarmonyHarmony created when chords are built using fourths one on top of each other instead of traditional thirds.  \n Inverted PedalSimilar to a pedal (or pedal note) but heard above the main melodic line instead of below.  \n Neopolitan SixthA major chord built on the flattened second (supertonic).  \n Compound IntervalAn interval bigger than an octave eg a ninth, eleventh etc.  \n GlissandoA continuous slide upwards, or downwards between two notes.  \n • Area of Study 4: Fusion: Samba Em Preludium\n Test yourself\n Acoustic GuitarNon-Electric classical or steel strung guitar \n RiffA repeated musical pattern, can be pitched or non-pitched.  \n Bossa-NovaA genre of Brazilian Music.  \n SoloWhen one performer improvises a solo. \n TurnaroundA given chord (often a V7) that brings you back to the main 'head' or main melody.  \n Extended ChordsChords with a 7th, 9th, 11th or 13th added.  \n Altered ChordA chord where one note has been raised or lowered by a semi-tone.  \n Enharmonic EquivalentAll notes have two names eg A sharp or B flat.  \n CounterpointThe relationship between voices who are harmonically independent (Polyphony).  \n OverdubbedTo record, or play, over an existing recording.  \n • Composition Coursework\n • Composition Coursework\n • Exam Revision", "pred_label": "__label__1", "pred_score_pos": 0.98332279920578} {"content": "Quick Answer: What Are Mathematical Patterns In Nature?\n\nWhat is Waves pattern in nature?\n\n\n\n\nWhat is the mathematics in nature?\n\n\nWhat are the importance of patterns in nature?\n\nThere are so many reasons why understanding patterns in nature is important. People have built cities and created art based on the patterns they see. We have used patterns, like the alphabet and sign language to help us communicate with one another. But since our world is always changing, so do patterns.\n\nWhat is the most common shape in nature?\n\n\nWhat is tessellation patterns in nature?\n\nTessellations form a class of patterns found in nature. … Distinct shapes are formed from several geometric units (tiles) that all fit together with no gaps or overlaps to form an interesting and united pattern.\n\nWhat is the role of mathematics in nature?\n\nMathematics exists all around us in the natural world. It is our task to bring our children’s attention to the data and help them see the world around them in a mathematical way. … Conservation biologists, wilderness rangers, and researcher professionals all use mathematics in nature on a daily basis for their careers.\n\nWhat is the example of pattern?\n\n\nHow many types of patterns are there?\n\nThe different types of pattern as follows, Solid or single piece pattern. Split pattern or two piece pattern. Multi-piece pattern.\n\nWhat is the relationship of mathematics in nature?\n\nSo mathematics is an exact science. This is because nature is mathematical; any science that aims to explain nature is totally dependent on mathematics. It is no possible to exaggerate this point. Nature is distinctively mathematical, and nature speaks to us in mathematics.\n\nWhat is an example of a pattern in nature?\n\n\nWhat is the pattern?\n\n\nWhat is the importance of pattern?\n\nPattern is fundamental to our understanding of the world; it is an important element in every mathematics curriculum. The importance of patterns usually gets lost in a repeating pattern of two dimensional shapes. Patterns in mathematics are much more than a repeating pattern of shapes.\n\nWhat are the 5 patterns in nature How is Fibonacci related to nature?\n\nAnother simple example in which it is possible to find the Fibonacci sequence in nature is given by the number of petals of flowers. Most have three (like lilies and irises), five (parnassia, rose hips) or eight (cosmea), 13 (some daisies), 21 (chicory), 34, 55 or 89 (asteraceae).\n\nWhat is the beauty of mathematics in nature?\n", "pred_label": "__label__1", "pred_score_pos": 0.9833196401596069} {"content": "The Eight Most Dangerous Roads That Will Leave You Breathless\n\n\nYou like strong emotions. The kind of emotions that make you feel you are out of breath or simply gasping for air. You are addicted to the type of adrenaline you feel when you are in a roller coaster. The exact moment just before falling into the abyss. If you can relate, you can’t miss this tour around the eight most dangerous roads.\n\nGuoliang tunnel, dangerous roads of China\n\ndangerous roads\n\nThis interesting and vertiginous tunnel is located in the province of Henan, among the mountains of Taihang, China. On the top of the mountains there’s a small town. The only way to get there is using the almost vertical stone stairs that they have. The people from the village didn’t want the place to become a ghost town. This is why they decided to build the 0,6 miles (1 km) tunnel with 13 ft (4 meters wide). It is built inside a cliff, this is what makes it one of the most dangerous roads. The residents decided to build windows inside the tunnel to have illumination. This tunnel is only suitable for the brilliant drivers who don’t fear driving on the brink of the abyss. Are you one of them?\n\nDevil’s Nose Train, dangerous roads of Ecuador\n\ndangerous roads\n\nSome people like to define it as the most difficult train of the world. The truth is that we would like to tell you that they are exaggerating. But to be honest, the name does justice to the train. If you don’t believe it, judge for yourself. This train trip begins in Alausí, a town located in the vicinity of the Central Andes. The train climbs the mountain baptized as Devil’s Nose, with 0,4 miles (800 meters) long including zigzags. A few years ago, as a tourist you were allowed to do this trip on the top of the coach. Because doing it seated on your seat wasn’t dangerous enough!\n\nPassage du Gois, dangerous roads of France\n\ndangerous roads\n\nAt first sight, it might seem a regular road that unifies the Noirmoutier island with the rest of France. However, even though it is hard to believe, it’s one of the most dangerous roads. Its unique feature is that it disappears as if by magic. But it’s not magic, the trick of these appearances and disappearances is the tide: it varies throughout the day. Thousands of people got stuck there. If you don’t want this to happen to you, don’t forget to check the timetables.\n\nSkippers Road, dangerous roads of New Zealand\n\ndangerous roads\n\nTwo centuries ago, this used to be the road that gold prospectors used in New Zealand. Over the years, this road has become one of the most famous roads of the country. Why? Its narrow spaciousness, the curved and sinuous unpaved roads and the steeped uphills and downhills. This is what makes it one of the most dangerous roads. If you are wondering if it’s actually as wild as they want us to believe…yes. In fact, a special permission is needed to drive there. It is not suitable for all types of drivers.\n\nDalton Highway, dangerous roads of Alaska, USA\n\ndangerous roads\n\nThis highway, also known as Route 11, is a super long and dangerous road with more than 410 miles (660 km) long. It is so long that it goes through all the North and Center of Alaska. The James W. Dalton Highway is one of the two dangerous roads that passes by the Arctic Polar Circle. The landscapes of this road are amazing: boreal forests, the Yukon River or the Brooks Range. But, why is it dangerous?\n\nWell, primarily because the most part of this road is unpaved, you would drive on fine gravel. There are also steep slopes with 10 and 12 degrees. Most vehicles get a flat tire after driving through this road. There are only three places with population, three gas stations and just one hospital all along these miles (kilometers). On top of that we need to keep in mind Alaska’s weather, especially during the winter. Do you dare to go through Dalton’s dangerous road?\n\nTrain to the Clouds, dangerous roads of Argentina\n\ndangerous roads\n\nThis curious train in Argentina is not for everyone, and even less fot those who get vertigo. All over the 134 miles (217 km) travellers will have to overcome many problems. More than twenty tunnels, more than forty dangerous tunnels, two spirals and three zigzags. As if it were a roller coaster! And don’t think that they chose a random name: Train to the Clouds. They chose it because at some parts the train is so high that it goes through the clouds. No doubt this is a dangerous road, right?\n\nOn the train’s track Mae Klong Market, dangerous roads of Thailand\n\ndangerous roads\n\nThis could be the most surreal and curious market of the world and no wonder. The market, with more than 656 ft (200 meters) long, it’s located on the train’s track. The sellers are experts on gathering all the items when the train passes by and relocating everything when it’s gone.\n\nBe attentive when you are ordering food if you don’t want to be run over by the train. And no, this is not an exception, the train goes through the market eight times a day. What a dangerous road!\n\nThe Yungas Road, dangerous roads of Bolivia\n\ndangerous roads\n\nThis 50 miles (80 km) path is also known as ‘The Death Road’. The reason is the amount of deaths that take place in one year.  The dangerous road connects the urban areas of La Paz and Coroico. It descends 2 altitude miles (3.3300 metros) in just 1181 ft (360 metros). The road is so narrow that two vehicles can’t pass by at once. One of them has to go backwards along the sinuous curves that are too difficult for most drivers. Would you dare?\n\nIf you liked this article, check these ones!\n\nTop 20 Travel Locations for Autumn 2019\n\nAloe Vera improves your health starting today: discover all of its benefits", "pred_label": "__label__1", "pred_score_pos": 0.5423899292945862} {"content": "Are you a Fit-Pro who is worried about your Client’s relationship with their body?\n\n\nWorking in a gym and I often hear the conversations about shredding, bulking, leaning up and cutting daily. Clients and trainers talk about food, diets, calories, macros, weight and restriction constantly.\n\nTrainers and clients celebrate dramatic weight loss without a question of how or why. High fives are given for double sessions and smash and grab training, reinforcing the idea that clients need to be leaving the gym barely able to walk after the session.\n\nYet on a weekly basis, I am having conversations in private with clients, trainers, and staff about their screwed up relationship with food, their bodies and themselves. This is not a mere few people struggling, this is more and more people on a weekly basis who are trying to get fit and healthy that have gone too far and is no longer healthy for their bodies or their minds.\n\nStruggles include obsessive exercise, binging, fear of food, carbs and fat, obsessing over the scale or body fat percentage and spending hours comparing themselves to others both on social media and in real life.\n\nThese may seem like not such a big deal but these all-consuming thoughts can be absolutely debilitating to someone’s social life, ability to create healthy relationships, mental health and their belief in their own self-worth.\n\nAs someone who has been on the other side and worked as an Eating Disorder counsellor, I have spoken to hundreds of people who are struggling with this daily.  These thoughts and feelings do not just go away by themselves, it can take a lifetime to build back a healthy relationship with food exercise and yourself.\n\n\nWhy do we as health and fitness professionals need to know about this stuff?\n\nClients who are struggling with disordered eating are highly likely to be accessing a gym environment. As health fitness professionals we are in a unique position where we are trusted, we are relied upon for advice and we can create a safe place for clients to ask for support.\n\nWe are likely to see our clients regularly enough to be able to notice some of these concerning behaviours and to suggest someone gets help.\n\nIt’s important for trainers to look out for and recognize the warning signs when people are starting to develop negative thinking patterns around their food and body and know what to do about it.\n\nA reminder that someone struggling with an eating disorder does not have a “look”.  What is important to realize is that someone struggling with their relationship with food or their body does not have to be underweight in fact most individuals are in the normal weight range. A sufferer can be any shape or size, male or female, young or old.\n\n\nGiving nutrition guidance\n\nTrainers without proper nutrition training should not be giving nutrition advice beyond their scope of practice.\n\nThe scope of practice does include behavioural based changes, eating more whole foods, 4-5 cups of vegetables, reducing processed and packaged food.\n\nFor the majority of our clients following these guidelines is enough to make a physical change.\n\nBut our clients want dramatic changes, they want to see abs and they want to see them now. So combined with pressure to “get results”, old fashioned information, trainers feel the pressure to encourage clients into more and more restrictive behaviours.\n\nNo one should be recommending extreme low-calorie diets,  cutting whole food groups, or severely restricting without any reason.\n\nSimilarly, trainers should not be encouraging clients to do the same diet they have done because it worked for them. Just because you lost 12 kgs on Keto does not mean your clients should be doing the same.\n\n\nRed flags\n\nOne or two of these behaviours may not be a concern, but noticing more than three is worth exploring more with your client, or listening in to how they speak about themselves  when you speak with them.\n\n\nClient’s behaviours’ you might notice\n\nGoing to the gym every day, sometimes twice per day without rest days.\n\nPushing through classes despite injury or sickness\n\nSolely focused on an aesthetic goal or weight goal\n\nReduced socializing, withdrawal and isolation\n\nWeighing themselves daily and the day is dictated by the number on the scale\n\nAvoiding social situations totally due to not being able to eat off the menu\n\nSpending hours weighing food and obsessing over calories or macros\n\nSpending a lot of time in front of the mirror analyzing body fat\n\nA lot of selfies and photos of abs, leanness on their social media stream\n\nSpending a lot of time on social media comparing themselves with others\n\nCompulsive exercising-such as running in 40-degree heat or in rain or storm conditions\n\nCannot take a rest day even when on holiday, or have a serious life event such a funeral or wedding that they don’t attend\n\nConstantly cutting out food groups and then more cutting and cutting – no flour, no gluten, no sugar\n\nAbusing laxatives or diet pills\n\nSteroid or legal steroid use\n\nExtreme weight fluctuations or rapid loss and regain cycling\n\n\nConversations or language clients may use\n\nThe negative way they speak about themselves, or inability to see efforts as a success\n\nLabelling food as good or bad\n\nFeeling guilty about missing a training session because they didn’t have a chance to burn calories\n\nConstantly talking about how much better other people’s bodies are\n\nTalking about feelings of guilt, shame or embarrassment\n\nThe subtle signs in the way they talk about themselves as not good enough or useless\n\nWhen they say consistently they hate their body\n\nFeel that whatever they do it is not good enough\n\n\nWhat can we do if we are concerned?\n\nBe prepared with how you will open the conversation, don’t judge the behaviours or make comments on weight or appearance. Find a quiet place to talk, the gym floor at peak hour is not ideal. Invite your client to sit down with you after a session or grab a cup of coffee together.\n\nHave some resources and referrals ready, even if the conversation is met with a brickwall you can provide your client with information to get support when they are ready.\n\n\nThree conversation starters\n\nStart by being curious and asking open-ended questions. All it takes is asking questions without judgement and creating a safe place for a response.  Even if you don’t feel you have the skills to start a conversation simply asking, “Is everything ok” and then listening can go a long way.\n\n\nI’m hearing that you spend a lot of time comparing yourself to other people’s bodies, how does that make you feel when you’re spending a lot of time in that headspace?\n\n\nI’m reflecting that it seems like it’s so hard for you to eat differently or eat more is that something that worries you?\n\n\nHow do you feel about the new changes you are making to your lifestyle, is this something that feels easy or is it stressful and taking up a lot of brain and thought space?\n\n\nWait and listen to their response.\n\nThese things will affect people differently, and for some, they won’t feel like what you’re noticing has much of an impact. However if your client says its feeling pretty stressful right now use this as an opportunity to suggest something that might feel less stressful using your professional judgement.\n\nFor others, it might be that they’re so stuck in it they don’t realize that it affects them negatively and this question gives them space to reflect on if it is a problem for them or not.\n\nThese kind of question gives your client an opportunity to reflect on how their actions can impact on their feelings, mood and daily life.  Your client may say I’ve never really thought about it, or they may say it makes me feel really horrible and I hate it.\n\nFrom here you might be able to provide some resources or encourage them to speak with a counsellor or Eating Disorder support services.\n\nYou are not expected to be the counsellor but by knowing what is available you can point them in the right direction to get the support they deserve.\n\n\nWhere to refer\n\nAsk them to speak with their GP to link them in with their local psychologist. Ideally, a psychologist who as training in eating disorders or body image concerns.\n\nAsk them to make an appointment with a dietician or nutritionist so that you two can work  together to create a better relationship with food, a non- diet or Eating disorder trained clinician is best.\n\n\nThe national Eating disorders service in Australia is:\n\nButterfly’s National Helpline:\n\nCall 1800 33 4673,  webchat.\n\nOpen 8am – midnight AEST, seven days a week.\n\nThey can also link you in with a specialized provider in your area.\n\n\nWhere to from here\n\nOne of the biggest challenges for someone struggling with food or exercise is that it can take time to reach out for help. There’s a lot of fear and shame around these thoughts and behaviours.\n\nLetting go of these behaviours can feel like a loss of control, a step backwards, and a return to what may have been a place where they felt very unhappy. As a trainer we can provide support and encouragement that seeking professional help whilst scary will be worth it in the long run.\n\nIf you notice somebody or if the somebody is yourself there is definitely help out there.\n\nJust know that it isn’t always going to feel this way, that change is possible that you can build a healthy happy flexible relationship with food, with your body and yourself and that there is support out there.\n\n\nIf you are a Fitpro who wants to know more about helping your clients heal their relationship with food, exercise and their body subscribe to my  Mind Body Peace movement. \n\nOr join our online FB group", "pred_label": "__label__1", "pred_score_pos": 0.6406551599502563} {"content": "14 January 2021\n\nOn the 13th of January, the Old New Year is celebrated in Russia - a holiday with the traditions of old times and modern habits. The Old New Year appeared in our calendar because of a change in chronology, when the Bolsheviks transferred the country from the Julian calendar to the Gregorian one.\n\n11 January 2021\n\nChristmas is an important holiday for the Christian world. It is celebrated by both Catholics and Orthodox. By tradition, the Orthodox Christmas is on the 7th of January, while the Catholic and Protestant is on the 25th of December.\n\nFind Your Tour\n\n\nNizhny Novgorod\n\nNizhny Novgorod is a medieval city, located in western Russia, four hundred kilometers from Moscow. It is located on the banks of the Volga and Oka rivers. It is a main stopover point for tourist cruises that travel the course of the Volga River. Nizhny Novgorod has a well-preserved old center. UNESCO includes Nizhny Novgorod in the list of the 100 cities of the world that represent the historical and cultural value of the world. Between its founding in 1221 and the 14th century it was burned and ruined seven times by the tribes and armies of the Tatars. But after each invasion the people restored and renovated the city.\n\nApart from the Kremlin of Nizhny Novgorod, located on a hill above the Volga, which offers great views to the north and west, the main attractions are the Tower of St. Dimitrius and the Bolshaya Pokrovskaya street, a pedestrian street, full of historical buildings, shops , banks, theaters, and restaurants.\n\nThere is also an art museum in Nizhny Novgorod which was founded in 1896, it has more than 10,000 exhibits. Ancient Russian art is present in unique paintings and icons from the 14th to the 19th century. The museum is divided into: ancient Russian art, modern Russian art and Eastern European art. All styles and trends are represented. The museum has a rich collection of costumes, various arts, glassware, and porcelain.\n\nIn the center of the city, you will find the world-class stadium \"Nizhny Novgorod\". This arena hosted six games of the World Football Championship in 2018. After the tournament was over, the stadium became a multifunctional sports center.", "pred_label": "__label__1", "pred_score_pos": 0.9225149154663086} {"content": "RBI Defers Bad Loans; Supports Lenders to Stand Stressed Assets\n\nIn the background of COVID-19 pandemic and a nation-wide lockdown, there are chances of an increased percentage of bad loans in the country. Therefore, the Reserve Bank of India (RBI) has decided to provide relief to lenders. That is RBI has instructed banks to keep enough funds aside so that the banks must be ready to face stressed assets due to the depleting economy.\n\nThis announcement was made as part of the second contingency plan of RBI that deals with the COVID-19 consequences on economic and financial sectors. \n\nUsually, a loan is categorised as a non-performing asset (NPA) if the payments are overdue for more than 90 days. However, RBI has declared a three-month moratorium for term loans on 27 March 2020. Therefore, customers who have chosen for the moratorium will not be marked as NPA. \n\nConsider that a person chose to stop payments and avail the three-month moratorium for his loan. If he defaults on payments for another three months after the completion of the moratorium period, his loan can be marked as a bad loan. Essentially, in this case, banks have a period of 180 days to classify a loan as a bad one. \n\nBanks benefit from this move in the sense that loans will not turn out to be bad loans immediately. There may be a deterioration in the asset quality in the second and third quarters of the financial year. However, the same may not be profitable for non-banking finance corporations (NBFCs) as though follow the ‘loss given default’ method. \n\nAlso Read: RBI cuts rate by 75 basis points to 4.4% and defers EMI payments\n\nRBI stated that the banks have to maintain a higher provision of 10% on all such accounts under the standstill over the two quarters—March 2020 and June 2020. In a detailed circular dated 17 April 2020, the banking regulator mentioned that the banks must make at least 5% provision for the March quarter and the rest by June 2020.\n\nBanks can adjust the general provision against the statutory provisions one the slippages are labelled as NPAs. The provisions will not be considered to identify the net NPAs until they are adjusted against the actual provisioning requirements. Banks are also instructed to make necessary disclosures on such provisions in the quarterly result announcements.\n\n\nYou May Also Like\n\n\n\nPensioners Who Opted for Commutation To Receive Higher Pension\n\n\nHere’s What You Should Know About Overdraft Facility\n\n\nIncome Tax Not Applicable on Disability Pension for Defense Personnel\n", "pred_label": "__label__1", "pred_score_pos": 0.9367536902427673} {"content": "BUS 100 Lecture Notes - Antireligion\n\n73 views3 pages\nPublished on 3 Oct 2012\nShangara Flora\nResearch Essay: Oryx and Crake Outline\nWhat does this book say about religion? Do you think it is pro or anti-religion? How does\nSnowman/Jimmy portray Oryx and Crake as gods?\nAtwood is making a definitive statement as to whether God created man or\nwhether man created God. Undoubtedly she is suggesting that man inevitably, despite\nof himself, creates God, with or without outside assistance (explain better). Oryx and\nCrake displays a wide variation of religious and biblical references which supports\nAtwood’s notion that God is nonexistent, thus proving that this is an anti-religious text.\nJimmy uses Crake as an explanation for the creation of Crakers and Oryx for the\ncreation of animals. Therefore, Crake became the creator of God and Oryx became the\ncreator of animals in the eyes of the Crakers. In regards to anti-religion and this book,\nwe see that the destruction caused by Crake’s vision of perfection leads to a disbelief in\nGod’s existence and those examples prove that God is a manipulative tool used by\nthose that subsist power and control, which is a reflection of the past issues our society\nstill faces. World Figures such as Crake have views that his employees and people\nCrake’s temptation to play the role of God, alongside the corporations who\nsupported Crake’s vision, caused the virus spread and subsequent destruction of the\nworld. This led to the questioning of God’s existence. God is supposed to be the\ngateway to happiness and salvation. When the Wolvogs, Pigs and other creations\nescaped, the almighty Supreme Being was not there to eliminate them or save the\npeople attacked by these creatures. In every case, when you are not given evidence, it\nbecomes difficult to believe. And in the case of God, when people say he created the\nworld, if he is not there to sustain it, we lose belief in his existence. Throughout history,\nmany disasters and catastrophes have struck the world, yet there has been no\nreassurance of God’s existence. Since World War II, people have questioned God’s\nexistence. There have been several books published that ask the question and talk\nabout the repercussions of the event such as “Where Was God?” – by Remkes\nKooistra. After the Holocaust and the ruling of Hitler, people witnessed the world\nplummeting and hope was being lost as God allowed it all to happen. Similarily, in Oryx\nand Crake, people witnessed the virus kill those around them and started to question\nwhere God was to save them. Also, there are remarks that the play “Waiting for Godot,”\nwas entirely those who were loitering by the withered tree waiting for salvation, which\nnever comes. It seems fairly certain that Godot stands for God. To this day we have\natheists and the modern turn is towards science and the notion of evidence supporting\nGod Manipulation is not anti-religion, however, those that manipulate God for\ntheir own purposes initially don't believe in God in a spiritual context. In Oryx and Crake,\nJimmy uses Oryx as a God figure to make the Crakers retrieve one fish a week to\ncontinue his survival. “The people would never eat a fish themselves, but they have to\nbring him one a week because he’s told them Crake has decreed it.… He told them\nUnlock document\n\nThis preview shows page 1 of the document.\nUnlock all 3 pages and 3 million more documents.\n\nAlready have an account? Log in\n\nGet OneClass Notes+\n\nUnlimited access to class notes and textbook notes.\n\nYearlyBest Value\n75% OFF\n$8 USD/m\n$30 USD/m", "pred_label": "__label__1", "pred_score_pos": 0.9901018738746643} {"content": "The masterpieces of Persepolis and Pasargadae\n\nDecember 17, 2020\ntour operator iran\n\nIf you travel to Iran, undoubtedly one of your most favorite sites would be in Shiraz. UNESCO World Heritage sites of Persepolis and Pasargadae are located near Shiraz in Marvdasht and are worthy-visiting sites which remained from the civilization of Persians during Achaemenid Empire. Follow us to give some useful information about them.\n\n\n\n\nPersepolis (Takht-e Jamshid)\n\nPersepolis is a symbol of glory in ancient Persia and the most important site of Shiraz. Perhaps the region of Persepolis and the remaining buildings in it can be considered as one of the most important documents in the history of civilization in the world. Hence, prominent scientists and archaeologists from all over the world have traveled to Iran to visit Persepolis. Persepolis is a relic of Achaemenid kings in Iran from 2500 BC. Considering the greatness of the Achaemenid Empire in ancient Iran, which covered a significant part of the eastern part of the world, we can understand the glory of the headquarters of these kings in Persepolis. What attracts the attention of the world to Persepolis is not only the historical antiquity of this ancient city. Archaeologists have discovered the development of civilization in ancient Persia by carefully studying the inscriptions and artifacts obtained from this region. The social laws of the Achaemenid period have also surprised many historians. We want to introduce the most important parts of Persepolis.\n\n\n\n\nThe history and architecture of Persepolis\n\nThe construction of Persepolis dates back to 518 BC, about 2500 years ago. Darius I, the third Achaemenid king, ordered the construction of a huge palace in the mountains around Marvdasht; But the process of building the mansions and statues of Persepolis took a long time and continued during the reign of later kings.\n\nEach of the palaces in the Persepolis area was built during the reign of one of the Achaemenid kings. The splendor and beauty of Persepolis buildings still amazes designers and engineers today; It is not easy to build such a huge collection at this time, despite the vast possibilities. According to the surviving inscriptions of the Achaemenids in various places, Darius’ purpose was to build a place as a symbol of progressive ancient Iranians.\n\n\n\n\nThe glory days of Persepolis continued until Alexander the Great invaded Iran. In 334 BC, Alexander the Great with his troops invaded Iran and after reaching the seat of the Achaemenid kingdom, looted houses and burned the heritage of Persepolis. Alexander’s hatred of the powerful Achaemenid kings caused him to burn down Xerxes’ palace; But the fire spread to other palaces and destroyed large parts of Persepolis.\n\nBefore the destruction of Persepolis, the Achaemenid palaces and mansions, due to being located in one of the best parts of Iran at the foot of Mount Rahmat or Mehr (means kindness), were very scenic and had a beautiful view of the surrounding valleys and plains. Inside Persepolis, there was an area similar to a town, and the distance between the palaces was paved. The interior design of Persepolis has been very advanced according to today’s engineering and architectural standards, and modern order and design can be seen in the division of interior neighborhoods. Persepolis palaces had different uses and each of them was used in different ceremonies and celebrations. Also, Water and sewage piping system in Persepolis is one of the most interesting architectural points. Between the streets, waterways were dug in such a way that rainwater and running water flowed through them and were directed through canals in a specific direction.\n\n\nReliefs of Persepolis\n\nAmong the most important artifacts discovered in the Persepolis region, we can mention the inscriptions and reliefs that have been engraved in different parts of the palaces and buildings of this region. Due to the antiquity of Persepolis, these findings are one of the most important documents of early civilizations for history in the world and scientists and researchers from around the world have tried to decipher and read these inscriptions and works. Many parts of the lines engraved on the inscriptions are read today; But decipherment of these inscriptions is still going on in different parts of the world.\n\n\n\n\n\nFrom a complete examination of the reliefs, it can be concluded that the message of the Achaemenid kings to the future was to show unity, social equality and rich culture in ancient Iran. Maybe that’s why today all over the world, Persepolis is known and people travel to Iran to visit it.\n\nIn total, there are more than 3,000 reliefs in different parts of Persepolis palaces, in all of which common concepts can be found. In these reliefs the king is engraved with guards, courtiers, horses and chariots and court elders. One of the interesting points in the design of the sculptures of the gates and  the palaces in Persepolis is the direction and movement of the king and the soldiers in these images, so that archaeologists have been able to find the entrances and exits of the palaces accordingly.\n\nA long line of soldiers is depicted on the stairs. On the western sides of the palaces of Darius and Ardashir are engraved maps of the dependent nations. Other engraved images on the walls and entrances of these palaces include images of kings fighting legendary demons.\n\nIn the surviving inscriptions from the Achaemenid period in Persepolis, a thoughtful description of how social laws have been discovered. According to information read by western archaeologists, during the Achaemenid period in Iran, men and women had equal social rights. Women were able to work and received special support during pregnancy and childbirth. Inheritance was the same for men and women. This social equality 2,500 years ago in ancient Iran is one of the greatest reasons for historians to wonder.\n\n\n\n\nGate of Nations\n\nAfter the entrance stairs, there is a small palace called “Gate of Nations”. The reason for this registration was due to the entry of representatives of different nations from this route and the entrance to other palaces. The pillars of the Gate of the Nations are currently one of the most complete pillars left in Persepolis. This place in the Persepolis area has been used as a waiting room.\n\n\n\n\nApadana Palace\n\n Apadana Palace, also known as Bar Palace, was one of the most beautiful and magnificent buildings in Persepolis, built during the reign of Darius I and his successor Xerxes. The construction of this palace took nearly 30 years and similarities have been found between this palace and Darius’ palace in Susa. On the four sides of the Apadana Hall were four towers with guard rooms. The main hall of Apadana Palace is three meters above the Apadana courtyard and the Gate of the Nations, and it rests on a mountain slope. The north staircase attached to the north porch and the east staircase attached to the east porch are the ways that connect the main hall with the surrounding palaces and courtyards. The walls of the stairs are decorated with reliefs and valuable inscriptions.\n\nThe beauties of Apadana Hall are indescribable in the past and a study of the elegance of this hall shows that countless artists have participated in the construction of Apadana Palace. This hall had a capacity of more than 10 thousand people.\n\n\n\n\nThe most beautiful part of Persepolis is located on the east porch of Apadana Palace. Six of the 12 pillars of this porch still remain, and their capitals are double-headed lions with great elegance. The sculptures of the eastern porch of Apadana Palace are considered to be the most beautiful parts of Persepolis. The elegance of the reliefs on the wall of this porch has attracted the attention of many archaeologists and enthusiasts. Other notable sculptures on the walls include images of people in various coverings, each of whom goes to the king with gifts in hand, and archaeologists have determined their nationality by their clothing and appearance. These images were a symbol of the nationalities under the command of the Achaemenids. Other people’s pictures are related to the servants and crew of the palace in different sections.\n\n\nCentral Palace\n\n It is located in the center of Persepolis. The hall of the Central Palace has been the site of formal and informal consultations and meetings with foreign guests and court elders, and the image of the court elders has been engraved on the steps of the palace. For this reason, this palace is also called “Council Palace” and “Gate of Kings”.\n\nThe main building of this palace is rectangular and there is a square hall in the middle of it. The four corners of the hall were supported by tall columns. The eastern entrance of the main hall leads from a narrow staircase to the southern corridor of the Palace of 100 Columns, and the western entrance provides access to the south of Apadana Palace and Apadana Hall. The north gate also leads to the courtyard of Apadana Palace.\n\n\n\nDarius private Palace (Thatcher palace)\n\nThis palace is one of the first buildings built in Persepolis. Thatcher Palace is located southwest of Apadana Palace, facing the sun, which is why Thatcher Palace is also known as the Winter Palace. On the other hand, the architectural elegance and polished cutting of the stones in the construction of this palace have also made it known as “Mirror House” and “Mirror Hall”.\n\n\n\n\nThe main hall was covered with red carpets and precious stones and gold leaf were used to decorate the carvings. Many parts of these carvings have been restored today, and an inscription with three lines of ancient Persian, Babylonian and Elamite, mentions the name of the builder of the palace, Darius I. Many of the pieces of sculpture found in the palace are now kept in the French National Library.\n\n\nPalace of 100 Columns\n\nOne Hundred Columns Palace” or “Throne Hall” was the second largest palace in Persepolis which is located in the eastern side of Apadana Palace courtyard. 10 rows of 10 columns with engravings and the heads of the cow columns held the two ends of the main hall. The height of each of these columns has reached 14 meters. On the door of this palace, the image of 100 Achaemenid soldiers has been engraved to symbolize the columns of Achaemenid rule.\n\n\n\n\nIn different parts of Persepolis palaces, a numerical relationship can be seen between the reliefs of that palace or area with columns, gates and stairs, which it seems that the designers intended to convey a special meaning.\n\n\nNaghshe Rustam (Necropolis)\n\nNaghsh-e-Rostam area in the north of Marvdasht and 6 km north of Persepolis is one of the most prominent sights in Fars province, which contains relics from the Elamite to the Sassanid era. Among the most important relics left in Naqsh-e Rostam, we can mention the stone tombs of Achaemenid kings in the heart of the mountains and inscriptions and reliefs of Sassanid kings and an Elamite inscription carved on the stone slope of Naqsh-e Rostam mountain.\n\n\n\nStone tombs in the heart of the mountain, which have survived from ancient times, have been other ways of burying the dead in the past. In the Naqsh-e-Rostam region, the tombs of the Achaemenid kings and their relatives in the heart of the mountain are examples of these tombs.\n\n\nNaghshe Rajab\n\nYou can visit many interesting things in Naghshe Rajab. The reliefs and beautiful lithographs are placed in this region with strange calmness. The lithographs are from the Sassanid period. Also, the historic town of Estakhr is on the other side of the road. Estakhr historical city was the birthplace of Ardeshir and Shapur Sassanid and they held their coronation ceremonies in their hometown. For this reason, there are lithographs and motifs of their coronation ceremonies in Naghshe Rajab and Naghshe Rostam.  Naghshe Rajab is one of the most prominent relief maps from pre-Islamic times. This relief includes four scenes of the coronation of Ardeshir Babakan, the coronation of Shapur I, Shapur I and the courtiers, as well as a scene of Cartier, the Sassanid priest.\n\n\n\n\n¨I liberated the great lands from the oppression of evil kings and gave life to their people. I never allowed the army to ruin, I never entered the temples and clean places of the lands and I declared that everyone is free to do whatever is good and beautiful in life.\n\nAs long as I live and Mazda has given me a kingdom, I will respect the religion and beliefs of the people of where I am the king, and I will not allow my rulers and subordinates to despise the religion of other peoples or hurt them.¨\n\n\n\nThese words were said by a man who is praised by the whole world today. Pasargadae is the burial place of this Persian patriot. A king that Iran is always proud of him.\n\nThe ancient complex of Pasargadae, which is a relic of the glorious Achaemenid period, is located in the city of the same name in Fars province. Among the historical structures of this place, we should mention Pasargadae Mosque, Pasargadae Royal Garden, Gate Palace, General Bar Palace, Private Palace, Two Pavilions, Cambyses Tomb, Mozaffari Caravanserai and the fountains of the Royal Garden. But without a doubt, its most prominent attraction is the tomb of Cyrus the Great. Pasargadae was registered as the UNESCO World Heritage site in 1994.\n\nThe ancient city of Pasargadae was the first capital of the Achaemenid Empire. The main area is about 160 hectares and is surrounded by a large natural area. The tomb of Cyrus the Great in the south, Tal Takht (Solomon’s throne) and fortifications on the hill north of the compound, the royal complex (Gate R, public hall or palace s, palace p and royal garden or four gardens) in the center of the main compound and Solomon prison in the north, are the different parts of this royal complex. Most likely, Cyrus the Great himself ordered the construction of this magnificent collection. Evidence such as trilingual inscriptions (Elamite, Ancient Persian and Akkadian) and more or less similar architecture to Persepolis reinforces this possibility.\n\n\n The best time to visit Persepolis and Pasargadae\n\n Visiting Persepolis and Pasargadae in the hot seasons of the year can be annoying due to the open area of these places and direct sunlight. The best time to travel to Persepolis is in the second half of the year and you can visit Persepolis until the mid-May. To visit the historical site of Persepolis and Pasargadae, it is better to choose the early hours of the day or visit them in the afternoon and after the weather cools down.\n\nIn the cold seasons of the year, after sunset, the area of ​​Persepolis and its surroundings are very cold; So, bring the right clothes with you. Cloudy days are also very suitable for visiting because there is no direct sunlight to bother you.\n\nIf you are interested in visiting Persepolis and surroundings, you can join our classic tours.\n\ntour operator iran\nTour operator Iran\n\nLeave a Reply\n\n\nWhatsApp chat", "pred_label": "__label__1", "pred_score_pos": 0.9988369345664978} {"content": "Cambridge Analytica's harvesting of 50 million Facebook profiles\n\n\nIn 2015, Facebook removed a feature that had been in place for some years that allowed developers to access information about Friends who had also signed up for their app. During that time, about 270,000 people downloaded and installed an app that was portrayed as part of an online personality quiz that offered a small payment to users who completed it. That app, This Is Your Digital Life, allowed University of Cambridge researcher Aleksandr Kogan to harvest data on an estimated 50 million Facebook users in the space of a few weeks. Users were told the data was for academic research. Later Facebook admitted 87 million users had their data harvested.\n\nFacebook's policies at that time prohibited Kogan from selling or sharing the data with third parties without consent, and also barred collecting Friends' data for any purpose other than improving the in-app user experience. Nonetheless, Kogan passed the data to Cambridge Analytica, which  was able to match it to other data sources to build about 30 million detailed profiles of American and British voters during the 2016 US Presidential election and the EU referendum's Vote Leave campaign. The test results and Facebook data also enabled the company to build models and an algorithm that could analyze profiles and identify personality traits linked to voting behaviour.\n\nFacebook learned of the breach of its policies in 2015. In 2016, it sent letters asking those holding copies of the data to confirm that it had been destroyed. However, it does not appear to have enforced the request by checking forensically that it had been deleted. The company did not report the discovery as a data breach in accordance with the laws of the state of California, where Facebook has its headquarters, on the basis that it was not a data breach but data misuse by third parties. In 2018, after the Guardian and the New York Times revealed the links between Facebook, Cambridge Analytica, and the elections, the US Federal Trade Commission began investigating the question of whether Facebook had violated their 2011 consent decree.\n\ntags: Facebook, Cambridge Analytica, Aleksandr Kogan, FTC, This Is Your Digital Life, apps, social networks, social graph, mathematics\nWriter: Carole Cadwalladr and Emma Graham-Harrison\nPublication: Guardian\n\nRelated learning resources\nTarget Profile", "pred_label": "__label__1", "pred_score_pos": 0.9996142983436584} {"content": "Leftward Ho!\n\nAs the intrigue swirls around Nancy Pelosi’s stated bid for House Minority Leader, the question has arisen more often than not, “why would the democratic caucus award Pelosi a lesser authoritative gavel when her current leadership just led them off a cliff?”\n\n\nReally, the matter is simpler than it appears, and it reflects back to her strong-armed tactics during the Health Care “debate.” It wasn’t about anybody but Nancy Pelosi.\n\n\nPelosi is fully aware of the “bleeding god” conundrum intrinsic to stories like that of Pre-Hawaiian Captain Cook; that the aura of being a deity to a trembling and deferential populous can be erased with a single mortal groan. Once those confined to the septic terra firma realized he was but one of them, they cut him to pieces.\n\n\nPelosi needs the leadership position if for no other reason than to have the scepter that divides her from the restless populous that holds her accountable for their mortal losses.  Perhaps they realize that her powers are far from omnipotent, but should she wield any perceivable control over them, it buffers her from suffering a complete and mortal deconstruction at the hands of her party.\n\n\nWhether or not she survives the bid remains to be seen.  The President, who either operates as an inflexible ideologue with no intent of deviating, or a tone-deaf teleprompter jockey, has at least signaled that “leftward ho!” is the short-term exclamation.  In that atmosphere, a democratic caucus that sees this election as a matter of an occluded message rather than ideological rejection will award her the position by default. \n\n\nBut to Pelosi, the real issue is an underlying fear that her diluted deification will result in complete and utter Muggle-dom.  And that is simply—a non-starter.", "pred_label": "__label__1", "pred_score_pos": 0.7327355146408081} {"content": "Protect your organization from the cyber-attacks in 2020\n\nMay 15, 2020\n2 min read\n\nWith the advancement of digital transformation and technologies like IoT, AI, Cloud, etc., the world is more connected than ever. Internet connectivity has become a major part of our day-to-day tasks ranging from business deals to entertainment. The rise in the number of hacking events and data breaches are a concern and often forces one to think about the price we might have to pay for this seamless connectivity with the world? As we enter this new decade, it is estimated that hacking would occur every 14 seconds; we must be prepared to protect our data and business. Let’s have a look at the trends of cybersecurity in 2020 and how to overcome it.\n\n1. Cloud-based Security\n\nAssuming cloud storage secure, most of the organizations are using them to perform their daily business and storing data and files. As more and more organizations are moving towards the use of cloud, data leakage, data loss, data privacy, and security are a growing concern. Cloud providers are implementing more security protocols, although the organizations must invest in Cloud Access Security Brokers (CASB’s) to ensure data safety.\n\n2. Phishing\n\nEmails remain the first choice for phishing attacks, although there is a rise in similar attacks through text messages and voice calls. In 2019, the rate of these attacks had increased by 290 percent. It has become one of the sophisticated ways for cyber attackers. There is a need for organizations to implement Continuous Monitoring Systems apart for the regular anti-spam and anti-virus tools to keep a close eye on these attacks.\n\n3. Mobile Devices\n\nThe number of mobile users has increased tremendously in recent years years, and so has the data stored in them. Mobile devices would be the number one option for hackers to attack. The attempted attacks may steal your personal or business data, credentials, and funds through a mobile app, social media platforms, or emails. We may see an increase in authentication technologies like multi-factor authentication or biometric.\n\n4. 5G and IoT\n\n5G networks are already in talk. The high-speed mobile networks will eventually make us stay connected to mobile data rather than a WiFi router, making the data more vulnerable to IoT attacks. 5G architecture is complex, and there are chances for hackers to gain access to the network and stealing the data. For security reasons, we believe it would require a combination of traditional methods and the upcoming protocols.\n\n5. AI and Machine Learning\n\nAI advances have helped develop deep learning algorithms making it easy to detect the attacks. Most of the security solutions are based on AI and ML algorithms to identify the attacks timely and reduce human error. Though, the same technology does attract hackers to figure out a weak spot and attack the network.", "pred_label": "__label__1", "pred_score_pos": 0.5923676490783691} {"content": "By Michael Welp, Ph.D., Co-founder\n\nWhite men don’t feel part of diversity efforts. Many think diversity is about “helping other people with their issues.” They don’t see their own self-interest in diversity efforts—how D&I is for them, too. Even worse, many feel like they’re seen as part of the problem. \n\nThose are big problems. \n\nWhy do so many white men feel this way? \n\nLet’s start with a dive into US business culture. Most organizational leaders hold mindsets and assumptions that keep white men on the sidelines of diversity. \n\nThe impact? \n\nDiversity and inclusion efforts stall. Stagnate. Remain surface level. \n\nWho Does Get the Focus?\n\nHistorically, race examines people of color’s experiences, gender examines women’s experiences, and sexual orientation examines experiences of gay, lesbian, bisexual people. What does not get usually examined is the experiences of being white, male and heterosexual. The result? White men do not think diversity is about them, too.  \n\nIn other words, those who are traditionally “outsiders” are usually the focus while “insiders” rarely get attention, nor do they recognize how their “insiderness” gives them a different experience. \n\nThis gets in their way of forming partnerships with outsiders.  \n\nWho Carries the Burden of Leading and Teaching Diversity?\n\nSeveral implications arise from this historical focus. One is the assumption that those traditionally focused on must be the leaders and teachers of diversity efforts because white men can’t lead or teach diversity. \n\nWhite men in mixed diversity learning sessions often look to white women and people of color to teach—and sometimes even prove that there is a diversity problem. They may sit back and be passive observers.  \n\nMore Assumptions: Zero-Sum, Focus on Data, Overlook the Heart\n\nSome white men see diversity as a zero-sum game: if others gain, we lose\n\nWe often don’t see their own cultural lens: how a focus on data discounts the emotions around the data, a missed opportunity to create new partnerships. \n\nWe think diversity is about numbers and getting more representation, overlooking how the lack of inclusion existing in the culture once the numbers are there results in high attrition.  \n\nWe want to rush into fixing a problem that we have not begun to fully understand, viewing it as a problem to solve rather than a longer journey to understand. \n\nWe forget to remain in learning mode, open to the complexities of diversity and inclusion always. Life safety and quality control, diversity isn’t a one-and-done class. It’s a constant, life-long commitment personally and organizationally.  \n\nWhite Men ARE Diversity Leaders\n\nWho sets the culture and must, therefore, be central in changing the culture? \n\nRobust, resilient diversity in the workplace thrives only when members of the majority group, or the insiders, actively educate and challenge each other. Insiders influence how well diversity and inclusion will work internally, either understanding their role or continuing to place the burden on outsiders. \n\nThe WMFDP way of engaging white men is an empowering way to shift mindsets and build the consciousness, competency and courage to form real partnerships across difference. Everyone, not just white men, have work to do to strengthen their diversity partnerships. The learning happens in an empowering non-blaming way that models how we want the future culture to be. \n\nTake your diversity and inclusion journey and you receive a bonus: you have just massively strengthened key critical leadership skills in your leaders. \n\nShowing my TEDx talk, White Men: Time to Discover Your Cultural Blind Spots, to key white male leaders in your organization is another next step to engaging them. You can also learn more about the importance of insiders by listening to this episode of The Insider Outsider Podcast: Why We Focus on White Men (in the US).\n\nInsiders Must Lead Globally\n\nGlobally, these issues play out uniquely, but all share the same underlying concept: Insiders must take an active role in understanding their insiderness and partnering with each other to educate and intervene to create inclusive teams and organizations. \n\nThe Result? \n\nWhen insiders, or white men in the US, are involved as critical agents of diversity and inclusion efforts, organizations around the globe see meaningful shifts in how leaders and their teams build partnerships and become better leaders.", "pred_label": "__label__1", "pred_score_pos": 0.9352012872695923} {"content": "View Full Version : filiation of the IE peoples of NW Iberia during the Bronze age\n\n29-11-13, 16:27\nHello Maciamo and all eupedia forum users : ) It’s some time now I follow this site which I found very interesting..\n\nI would have a question to pose about a very controversial theme here in my homeland, Galicia:\n\nSo were there a significative celtic presence down here? for decades, there have been two views, and today it is still difficult to draw a conclusion, since politics and prejudices are often involved on both sides..\n\nI mean a significative presence of Celts because those who deffend there were not a Celtic culture here often associate celtic names found in stelae or in the etymology of many toponyms as being of elements arrived as mercenaries for Roman legions; or as being not Celtic at all; but Italic or “alter-europaische”-\n\nOn the one hand, we have celtic-like names in this area, but it seems they are rather archaic. We don’t have any Gallaic inscription found. On the other hand, Lusitanian language filliation is still a mystery, since it shares many aspects with Celtic languages, but it keeps the initial p- and shows other similarities with Italic languages.\n\nSo the question would be: what can say mtDNA / yDNA tests about this? I’ve noticed R1b is relatively low in these areas, in comparisson with other parts of Iberia and the Atlantic facade. Maciamo thesis of R1b collonization of Western Europe from the East sounds pretty convincent to me… does this put an end to Sykes / Oppenheimmer studies about (northern) iberian (including Galicia) links to the Islands? what indo-european culture(s) settled in NW Iberia before Roman; and how deeply? (some pre-IE language remains were still present at Roman times; and it seemed to have been a certain degree of diglossia: Strabo reports that there were two words used to define Minho river, Minios (probably of Celtic origin) and the even more common Bainis or even Baites (that would be pre-IE; close homonim with andalusian Baitis, and anyway similar to basque ibai (river) and iberian baika (riverside land))\n\nI used to think there has been one non-IE speaking people; maybe around 40 % of population by the I Century B.C; that would have been the remains of Neolithic and Mesolithic Farmers linked to the Megalithic culture (native I; H and U and E1b1b; with large contributions of middle easterns since Neolithic times (G2a; J2...); about 40 % of people would belong to an pre-Celto-Germanic-Italic-split-IE language (the first IE that would have arrived here, around 1800 B.C ?) and the remaining 20% would have been a true Celtic minority close relative to Celtiberians; arrived after the VIII Century B.C...) I don't know if it makes sense looking at DNA data, specially because the pre-Celto-Germanic-Italic language seems not have arrived at all to Iberia; as migrations of the first IE wave would have been groups of bronze armed soldiers focused on ruling the conquered lands; as Maciamo's theory states that happened in Basque case. But then, from which language / period Lusitanian comes from?\n\nThanks and sorry for the English\n\n04-12-13, 10:51\nNo replies?\n\n04-12-13, 10:52\nNo replies?\n\ni never saw it\n\n01-03-14, 12:43\nHello, does anyone know something about this subject?\n\n01-03-14, 14:23\nHi, welcome to Eupedia.\n\nI have moved this thread to \"History and Civilizations\" as it not only involves genetics but also archaeology, history and linguistics and fits in better in that cathegory, rather than genetics.\n\nNow, regarding your questions, by the time that the Romans conquered the areas, the entire north and west of the Iberian peninsula (along with the centre) was heavily Celticized, and if you exclude Gaul and the British Isles, the north and northwest of Iberia also had the highest density of Celtic place names, and there is no conclusive evidence for a presence of pre-Indo-European languages in the northwest of Iberia (unlike the east and the south of the Iberian peninsula).\n\nWith regard for Lusitanian, I would argue that it is affiliated with the Celtic languages, despite the preservation of the *p sound from Proto-Indo-European (which is lost in all other Celtic languages, including Celtiberian), and it may thus stem from an earlier stratum of Celtic languages that were introduced in Iberia. Also Gallaecia was probably a \"mixed\" language area, as both Lusitanian and properly Celtic names can be found in the area.\n\nThe exact mode of how Celtic languages in Iberia arrived there is not clear, but my opinion is that the traditional Hallstatt/La-Tene model (ie, an introduction of Celtic languages with the iron age) cannot explain the presence of Celtic languages so far in the west. Since 2009, John Koch of the university of Aberystwyth proposed that the Celtic languages originated in the Atlantic Bronze Age, rather than in the Hallstatt Culture of Central Europe, but there are several problems with this idea: the first is that in virtually all scenarios on the origin of the Indo-European languages, Indo-European languages were introduced from the East, and it makes no sense to assume that (this is also the problem of the so-called 'Stelae People' hypothesis, which Maciamo disassembles here (http://www.eupedia.com/forum/threads/29290-Why-R1b-couldn-t-have-been-spread-around-Western-Europe-by-the-Bell-Beaker-people)), and also as far as the archaeological record goes, there is no credible evidence of a west-to-east expansion from the Atlantic Bronze Age. Koch also proposed that Tartessian (the language of the southwest of Iberia) was Celtic but this has been ripped apart by his critics. However, while the language itself was not Celtic, the Tartessians were in contact with Celtic-speaking peoples living in other areas of the Iberian peninsula (as evidenced by the recorded name of their king, \"Arganthonios\").\n\nOn the other hand, if one removes the \"absoluteness\" of archaeological cultures as far as their language affiliation goes, its plausible to assume that Celtic languages evolved on two fronts one (the more advanced Celtic languages) in Central Europe (which were introduced to Britain at the start of the Iron Age), and the other (the more primitive ones) in the Atlantic region.\n\n01-03-14, 15:24\nI had written a long post but something failed when submitting it; so I'll try to make a resume\n\nSome authors deny an ancient presence of celts in NW Iberia based on archeological findings, which instead points to a stronger mediterranean / phoenician connection than traditionaly thought. In fact, it seems that there is no hint here of the most properly celtic items (burials, chariots... (to sustain this, some authors have pointed that \"castros\" (hillfort) entrances had stairs)) deities (some consider Navia, Cossus, Reve, Bandua as non celtic; while others claim that Lucoubos could be linked to Lug) and social organization; arranged here in \"Centurias\" and not \"gens\"; that is, people was self-identified with his own village / area; and not with family roots). In fact, many of the presumably celtic elements of old Gallaecia seem to have been developed in roman times (this seem to be the case the \"castros\" culture itself; which, though based on indigenous precedents achieved is top development in 1st century AD). Even the personal and place names could have arrived only in roman times, when some auxiliar troops and settlers from Celtiberia would have come. Interestingly, some of the place names given usually as genuine celtic; those ended in -briga; have sometimes non-celtic first elements; both pre-celtic (Conim-briga...) or latin (Augustobriga; Flaviobriga...); which could indicate that \"briga\" was a borrowed world from celtiberians to mean \"hillfort\" (as the related word \"burgo\" was used later in Middle age Iberia borrowed from German)\n\nNow, for me the question here is: if R1b NW Iberians (on the other hand; relatively scarce (under 60%) in comparison with other areas) were not proper celts... what they were? should we consider them as being proto-celtic (and thus, speaking an elder stage of celtic language that any other celtic dialect had passed through) or para-celtic (that is, belonging to an all-new branch of IE dialects; sister of italo-celtic and germanic languages; but divergent with them) ? When was this area Indo-europeanized and which peoples might have taken part on this process; attending to DNA data?", "pred_label": "__label__1", "pred_score_pos": 0.8489727973937988} {"content": "brian tieu\n\nWinner of The Poetry Juicebox Art Award 2018 August\n\n\nbrian tieu is excited to share his work with the juicebox community. he is an aspiring engineering major and loves to delve into the technical areas of art and literature. other hobbies include swimming, competing on the piano, and suffering in the florida heat.\n\na line from a poem\n\n\"Yet Hope again elastic springs,\n\nUnconquered, though she fell;\n\nStill buoyant are her golden wings,\n\nStill strong to bear us well.\"\n\n- Charlotte Brontë\n\n\n\"We only have this moment, sparkling like a star in our hand—and melting like a snowflake.\" - Francis Bacon\n\na word to the poetry juicebox community\n\nTry something new. It's okay to wander.\n\nwant to chat with brian? reach him here:\n\n winning work \n\n\nmulti by Brian Tieu\n\n(issue 2)\n\n\"though separate, they are undoubtedly linked. the nations of the world do not exist individually, but as a single international group. whether that is as a union or as discordant factions is up to them. flags are the face of countries, states, and communities--nations rally behind them; they are the lifeblood of a people's identity and pride. i used many of them to represent a host of diverse nations, and while they are boxed in their own affairs with clear, dark lines, only together do they create a unified image.\"\n\n- brian tieu\n\nthe poetry juicebox\nan international poetry & art publication\nthe poetry juicebox\n", "pred_label": "__label__1", "pred_score_pos": 0.9623605012893677} {"content": "Updated: 12/7/2020\n\nStoryboard Text\n\n • Photosynthesis at WorkThese plants are growing and they are using light energy to help them grow. They do this through a process called photosynthesis.\n • Plants use carbon dioxide (CO2), water (H2O), and light energy to perform photosynthesis. This can be summarized by this formula 6CO2 + 6H2O + Energy (solar) →C6H12O6 + 6O2.\n • A light dependent reaction takes place when chlorophyll molecules within the plant cell, located in the thylakoid, absorb sunlight. That light energy is transferred to NADPH and ATP molecules which carry high energy electrons to a light-independent reaction. When NADPH and ATP molecules are formed, oxygen is released by the plant.\n • In the light-independent reaction the NADPH and ATP molecules combine with carbon dioxide and water to form energy storage molecules like glucose (C6H12O6)\n • Animals, including humans, need both oxygen and glucose to sustain life. Animals breathe the oxygen that plants release. The glucose is harvested by eating the plant or parts of plants.\n • Animal cell respiration works opposite of photosynthesis. Cell respiration uses glucose and oxygen. This can be summarized by this formula C6H12O6 + 6O2→6CO2 + 6H2O + Energy (ATP and Heat).\nOver 15 Million Storyboards Created\nStoryboard That Family", "pred_label": "__label__1", "pred_score_pos": 0.8588590621948242} {"content": "Interview with Mollo Rilla\n\nInterview by Svetlana Likhacheva\n\nInterview with Marco Ciofani, lead guitar/ lead vocal of Mollo Rilla\n\nTo celebrate the coming of the band’s brand new album called Viva El Camino, the creator of the band decided to share some of his thoughts about it. Mollo Rilla is known for their wild and unusual style which blends a lot of different music techniques and traditions together – because they think that is “the musical freedom”.\n\nMollo Rilla\n\nFirstly, thank you so much for this interview today. You are releasing your second full-length album soon. What kind of story it is going to take us into?\n\nViva El Camino means long live the road. Each song picks a topic crucial to life and either explores the subject or celebrates it.\n\n What was the most inspiring thing for you in the upcoming record?\n\nRecording in LA at The Hobby Shop Studio in Highland park. Working with Uncle Bil Lane and Mudrock. Also having written songs that I feel are strong and exciting to play.\n\nDo you create new music altogether, or does everyone prefer to write their own part?\n\nI show up with a song structure then we collaborate on parts.\n\nYour music style is known for blending a lot of different musical styles and a very unusual sound. How would you term your style and music genre?\n\nPeople ask me that quite a bit. I usually just say that we’re a hard rock band. Then if they check us out they can decide for themselves. Might be sort of a lame ambiguous answer but it’s not my style to spew a bunch of pretentious subgenres. I’d rather people just listen and see for themselves.\n\nMollo Rilla\n\n Which track from the new album was your favorite to work on and why?\n\nThat’s tough. “Mike Angelo” had some moments where I fell out of my chair from excitement. Scott Gillman played the sax on that track and just completely took my head off. What you hear on the record was his first take. Unreal talent paired with top professionality and an overall kind guy.\n\nYou guys are all from different bands. What are the pros and cons of having a bunch of experienced musicians with different styles in one band?\n\nWe all enjoy all music. We like to draw from spanish to stoner to metal etc. What binds us together is the love for fun heavy rocknroll. I wouldn’t necessarily say theilre are cons to it. I love what everyone can bring to the table even if we don’t use it at that moment.\n\nDid the way of recording change since your past record? If so, how and why?\n\nWe have come much further in our musicianship as a band since we started. We also practiced these songs a lot before heading to LA as to be as prepared as possible and not waste time. As far as how we recorded didn’t change much. Just the change of location and the people we worked with played a positive role in the process.\n\nHow do you keep the atmosphere during the writing or recording process peaceful and avoid creative conflict?\n\nI truly believe in the musicians I work with. Also naturally I’m an upbeat guy so while pulling 13 hour days in the studio I try to keep the energy up and positive.\n\nThe sound of Viva El Camino’s is considerably heavier than the one in your debut record. Why did you make a decision to create a darker and heavier sound?\n\nSimply because it’s really fun.\n\nmollo rilla photoshoot\n\nYou have already released one song from the album. It’s called Night Fang and, to my mind, it’s a very interesting and energetic song. What was behind the decision to release this particular song before the album release?\n\nEveryone had to pick 3 songs that could be a single and “Night Fang” was on all our lists. It’s a bop. A weird bop perhaps, but a bop none the less.\n\nSongs Let Go pt. One and Two are very different songs in both instrumentals and vocals. In addition, they don’t even go one after another in the order of the tracks. Is there any specific story or hidden context behind these two songs?\n\nI write about two different ways one might choose to “let go”.\n\nWhat are the band’s plans for the upcoming year?\n\nTo keep practicing and writing. To keep believing in a brighter better tomorrow from this current hour we live. All of us boys want to tour so we will be doing that as soon as we can.\n\nThank you for your time, is there anything you’d like to say to our readers?\n\nThis record brought us a ton of joy to make. I hope it brings you even a little joy to listen to.", "pred_label": "__label__1", "pred_score_pos": 0.5588324666023254} {"content": "The Croods: A New Age (PG)\n\nAge 8+\n\nPrehistoric cartoon sequel has slapstick, rude humor.\n\nThe Croods: A New Age” is the sequel to 2013’s “The Croods,” which centered on a family of Neanderthals, including teen daughter Eep (voiced by Emma Stone), trying to survive the elements. This film focuses on Eep’s romance with Guy (Ryan Reynolds) and her dad Grug’s (Nicolas Cage) worries about losing his daughter. While the clan faces all kinds of perilous moments, most of them are over-the-top and slapstick — fending off wild beasts is just another day in this family’s life. But as the story goes on, more threats emerge that could scare younger viewers. Those threats include monkeys with glowing eyes and a giant ape monster that intends to eat some of the main characters. Some kids may also find the “punch monkey” characters — which communicate by slugging each other — hilarious and try to imitate them. Characters use mild insults (“dumb,” “twits,” etc.), there’s some potty humor, and a bee sting makes one character act as if she’s drunk. Characters kiss, and one male is shown shirtless. Parent/child separation is referenced during a flashback, and the death of a boy’s family is implied. This film strays even further from actual prehistory than the first one did, but some tidbits could prompt discussions about human evolution and migration, and there are clear themes of courage, teamwork and the importance of being yourself. There are also some great “girl power” moments when Eep and the other female characters have to rescue the men. (95 minutes)\n\nIn theaters.\n\nBlack Beauty (Unrated)\n\n\nAge 10+\n\nPeril, emotional intensity in adaptation of classic tale.\n\nThis adaptation of Anna Sewell’s 1877 classic novel “Black Beauty” is emotionally taxing, with the central horse suffering abuse, loss and danger. The human characters, too, find themselves in perilous situations, including being dragged, chased, thrown and kicked by horses, nearly drowning in a flooding river and risking their own lives to pull horses out of a burning stable. There’s also emotional intensity throughout. Both the horse, Beauty, and her human soul mate, Jo (Mackenzie Foy), have suffered the loss of their parents and find themselves alone, their spirits nearly broken. Teen riders make fun of Jo for living and working at the stables, saying she smells bad. When Beauty is sold off to a series of different owners, she’s put to hard labor, mistreated and nearly worked to death more than once. Some of these scenes are quite sad; cruelty to animals can be very difficult to watch. That said, the film, told mostly from the horse’s perspective, ultimately shows a clear respect and admiration for the animals, and it conveys positive messages of loyalty, family, perseverance, resilience and courage. It ends on an uplifting note. (109 minutes)\n\nAvailable on Disney Plus.\n\nSuperintelligence (PG)\n\n\nAge 10+\n\nMelissa McCarthy fans will like A.I. comedy with pratfalls, kissing.\n\nSuperintelligence” is a comedy about a sophisticated, all-powerful artificial intelligence (A.I.) system that chooses a perfectly “average” woman, Carol Peters (Melissa McCarthy), to test as an example of whether humanity should be saved, enslaved or destroyed. The A.I. (which uses the voice of real-life comedian and talk-show host James Corden) tasks her with reconciling with her ex-boyfriend, George (Bobby Cannavale), to prove that humans are capable of love and redemption. Iffy language is minimal (“what the hell,” “badonkadonk”), but there’s some drinking and an implied love scene (silhouettes shown through closed blinds), as well as kissing. Expect lots of McCarthy’s signature pratfalls and physical comedy — other than that, violent and scary content consists of the A.I.’s threat of mass destruction. Ultimately, though the movie has themes of empathy, compassion and gratitude. (106 minutes)\n\nAvailable on HBO Max.\n\nMoonbase 8 (TV-14)\n\n\nAge 14+\n\nAstronaut sitcom features science disasters, body humor.\n\nMoonbase 8” is a comedy series about three wannabe astronauts training on a simulated moon base in Arizona. The show stars John C. Reilly, Tim Heidecker and Fred Armisen, three actors who are known for absurdist sketch comedy and anti-comedy. However, “Moonbase 8” plays mostly like a straightforward, traditional sitcom. The show builds comedy around the astronauts’ general unpreparedness for their mission. Jokes come from natural and scientific disasters that happen along the way, which sometimes cause great harm to the characters. Bodily function humor is also a big part of the show. For example, at one point the characters drink urine. Otherwise, the content is typical sitcom fare: buffoonery and learning from disastrous mistakes. (Six half-hour episodes)\n\nAvailable on Showtime.\n\nCommon Sense Media helps families make smart media choices. Go to for age-based and educational ratings and reviews for movies, games, apps, TV shows, web sites and books.", "pred_label": "__label__1", "pred_score_pos": 0.850828230381012} {"content": "Lesson aim\n\nMy aim for this lesson is to get the students to construct an algorithm for identifying a propaganda poster.\n\nThinking aims\n\nFor the students:\n\n • To identify which of the \"catagories\" they identified when sorting, are values and which are parameters.\n • To have the students identify which values belong to the parameters that they have, and which of these paramters are useful for identifying propaganda posters and should be taken further into their algorithms.\n\n\nThe lesson is a two hour lesson that in reality lasts 1hr and 45 minutes due to lunch. I started by getting them to cut out all the \"catagories\"they had from the last lesson. They were then to group the ones that belonged together, such as names of colours together, items of clothing together etc. They were then to think of a parameter for each of their little groups of values. I initially asked one person from each group to write their parameters on the whiteboard, but this didn`t work well from a logistical point of view. Next they had to look at their groups of parameters with the values, and try to see a pattern in the values belonging to each parameter i.e. limited use of colour, bold writing, large figures. The final stage was to then create an algorithm that could be used to identify a propaganda poster. To do this they had to select which of the parameters they felt were important.\n\nReflection on lesson and aims\n\nNot all groups managed to finish their algorithms and I felt that too much time was wasted cutting out the never-ending lists of catagories. Also it was helpful to have an overview on the board of the parameters that each group had identified, but in practice they whole group would go up and just stand watching (and criticising) as one person wrote.  So I would be a lot more specific in future about how I wanted this done. I also feel that the class was not as motivated this week, and they were not as keen to do the activities as they had been to do the initial sorting .\n\nI still feel that there is a gap between identifying the parameters and values, and transforming them into useful steps in the algorithm. My initial feelings are that the parameters are not specific enough to be useful. In order to make the algorithms useful tools I did remind the students of some of the things that shoudl be there, like composition for example, but they had to go back to theiir paramaters and values in order to decide WHAT it was about composition that should be there.\n\nJoomla SEF URLs by Artio", "pred_label": "__label__1", "pred_score_pos": 0.991710901260376} {"content": "Question: How Do I Know If My Car Has A Misfire?\n\nWhy is my car misfiring when I accelerate?\n\nSingle-cylinder misfires usually come from an ignition failure or a fuel injector problem.\n\nBad spark plugs and plug wires are classic culprits, but you could also be looking at a bad ignition coil.\n\nA “lean condition” code will most often indicate a bad or clogged fuel injector..\n\nHow do you fix a misfire?\n\nInspect the spark plugs for signs of damage. Use a spark plug socket to remove the plug so you can get a good look at it. The damage you see will help you determine the cause of the misfire. If the spark plug is just old, replacing it may solve the problem. Make sure to replace and properly gap new spark plugs.\n\nCan a misfire go away on its own?\n\nIt can go away permanently if it was bad gas. Otherwise, it is likely to return. Yes an “italian tune-up” can sometimes clear a misfire condition.\n\nCan low oil cause a misfire?\n\nCan a Bad Oil Pump Cause Misfire? Yes. A bad oil pump causes misfire by creating low oil pressure in the engine.\n\nWill injector cleaner fix a misfire?\n\n\nHow much does it cost to fix a misfire?\n\n\nWhat is the most common cause of a misfire?\n\n\nWhat does a car misfire feel like?\n\nRough Acceleration: As you start driving if it feels like the car is jerking but it’s not happening when idling, that’s also a sign of a misfire. … That said, if one cylinder is misfiring, that can unbalance the whole car and noticeably shake up your ride while driving and even idling.\n\nWhat can cause a car to misfire?\n\nMost Common Causes of an Engine MisfireIgnition system problems. When most people hear the term misfire, they think of worn out spark plugs. … Air and fuel delivery problems. … Emissions equipment problems. … Engine mechanical problems. … Sensor and module problems. … Control circuit problems.\n\nCan a misfire ruin an engine?\n\nA misfiring cylinder can cause a proportional loss of power. For example, if one cylinder misfires in a four cylinder engine, the car will lose 25 percent of its power. … Damaged, worn, or bad spark plugs, or a weak ignition coil can cause a loss of spark, and therefore, a misfiring cylinder.\n\nHow long can you drive with a misfire?\n\n\nCan you drive a car with a misfire?\n\nStrictly speaking it is not safe to drive your car if the engine is misfiring. If you notice the intermittent loss of power or poor acceleration, you should get to a mechanic as soon as possible. … The longer you drive with a misfiring engine the more likely it is that you’ll cause further damage to the engine.", "pred_label": "__label__1", "pred_score_pos": 0.9998809099197388} {"content": "September 2020: History as a Source Pt 1\n\nThere are many advantages to using a history as a basis for a narrative. History is a vast and ready-made store of cultural practises, personalities, events, and social phenomena. Indeed, the fact that history is made up of narratives and ready-made stories is in the very composition of the word. In many cases, it is almost harder to avoid relying on history – either directly or in the form of historically inspired tropes – than to do otherwise. Indeed, the foundations of many genres of fiction rely heavily on the historical context which either inspired them, or gave birth to them – be it the European high middle ages for conventional high fantasy, the age of sail and the 19th century heyday of colonialist adventure for space opera, or the social dynamics of Regency-era landed gentry for romance and the comedy of manners.\n\nI think there’s a pretty obvious reason for this. One of the main tasks of putting together a “good” narrative is in creating a story which maintains the audience’s suspension of disbelief. If the creator cannot convince the audience that the story they are telling is founded on a consistent logic which fits the characters and the setting, then it becomes incredibly difficult for that audience to invest themselves in that story. What a historical or historically-inspired setting offers is a certain guarantee in that regard, a promise, or at least an implication, of verisimilitude. These things actually happened in the past, so the argument goes. If they actually happened, then clearly, the sequence of events being presented must in some way possess an internal logic. If a story claims – implicitly or explicitly – to be at least partially based on events which actually occurred, on people who actually lived, and societies which actually existed, then it becomes a lot easier to convince the audience that those events, people, and societies can exist in a fictional narrative as well.\n\nThis advantage, however, comes with a heavy responsibility. The implication of verisimilitude is a sword that cuts both ways. Just as an audience will assume that a work set in, or clearly inspired by history will be set to a certain standard of authenticity, they can also internalise the idea that the fictional portrayal of that historical source is a faithful interpretation of what that history is. Although most people are perfectly capable of telling the difference between reality and fiction when they are consciously making an effort to do so, this sort of intentional discernment requires a certain understanding that the information they are ingesting is, indeed, fictional. When a creator makes a narrative which relies on the assumption of historical verisimilitude, they are asking their audience to have faith that the history which their narrative is based on is being represented authentically and honestly – and short of actually committing the time and effort and money to acquire the tools to study that historical source for themselves at an academic level, they have no reliable means of being able to tell a story based on authentic history, and one based on a distorted or misleading view of it. \n\nThe problem this poses is one that goes beyond the art of worldbuilding and storytelling, and it has ramifications beyond that of making a story “better” or “worse”. If an audience assumes that a narrative inspired by or set during historical phenomena portrays those phenomena faithfully, then the interpretation of the events in question will contribute to the audience’s understanding of that phenomena. A good interpretation can overturn popular misconceptions and generate interest in commonly ignored fields of study. A bad interpretation can reinforce pseudo-historical myths, encourage misconceptions, and even cause negative ramifications in wider society.\n\nThere is a pretty simple reason for this: the decisions humans make for the present and the future are based on their knowledge of the past. For a lot of everyday decisions, this is based on personal experience: people will prefer to eat the food they enjoyed before, they’ll associate with the people they’ve had previous positive experiences with, they’ll avoid things which have hurt them in the past. When there is no personal experience to draw on, people will draw on the personal experiences of others, as interpreted by history. When a person needs to understand the world and make decisions which may affect it, their decisions are informed by their understanding of history. Their interactions with people they’ve never personally met before, what causes they support or oppose, how they see groups which they have never met or places they’ve never visited, all of that is based on how well they understand that group or place’s history. A distorted understanding of history causes a distorted understanding of the world, which can lead to the making of unwise decisions, the support of unworthy causes, or even the fostering of unwarranted hatred.\n\nThis isn’t a mere theoretical argument – the ways in which influential pieces of media have distorted our own society are clear enough if you know where to look: Birth of a Nation‘s malicious misinterpretation of the aftermath of the American Civil War led to a new wave of racist violence at the hands of a rejuvenated Ku Klux Klan adhering to that narrative’s pseudo-history. Media interpretations of the Roman Empire as far more racially homogenous and more heteronormative than it was in reality have underpinned modern political arguments against immigration and multiculturalism. The perception of the European Middle Ages as racially homogenous, dominated by absolute monarchies; and entirely bereft of the influence of commoners, women, and overseas cultural and economic exchange has been a legacy of the popularisation of high fantasy settings which transparently take their aesthetic inspiration from a surface-level understanding of the high medieval period – a legacy which continues to lead to a streak of ethnonationalism and reactionarism within the genre and its audience today. \n\nSo how do we avoid this for our own works? It’d be easy for me to say that the key is something as simple as doing your research and reading your sources carefully, but that wouldn’t really be the case. After all, in a lot of cases, the creators of works inspired by or set in misinterpreted historical settings are ones who have done a great deal of reading on the topic. Indeed, most creators who consciously base their settings on historical source material are already enthusiastic consumers of literature and media regarding that same setting. Yet even this may not be enough to keep a creator from creating works based on a distorted idea of what actually happened.\n\nThat’s because the idea of history as a discipline for evaluating past decisions and phenomena is actually a very recent one, especially outside of academia. The more traditional definition of history – the one which is still taught in compulsory education – is more intended to exist as a form of national storytelling, a codified way of passing down a curated narrative of how a given society got to where they are. Primarily, this was a means to build a certain level of civic or ethnic pride, to hold up one’s ancestors and predecessors as heroic figures, whose traditions and achievements are worthy of respect and emulation. This often manifested in two forms: the elevation of “great men”, and the marginalisation or erasure of any historical context which might inconvenience a nationalist narrative. \n\nGreat Man Theory is born from a human desire to have heroes to root for and villains to hate. As the traditional understanding of history saw it as a means of cultural myth-making first and a means of informing decision making second, this meant that traditional historical narratives have focused more on prominent individuals rather than the societies and institutions which shaped and created them: thus, we learn that Wellington beat Napoleon at Waterloo, that Qin Shi Huang united China, that Hitler perpetrated the Holocaust. Of the millions of individuals who taught these larger-than-life figures, assisted them in their ambitions, and did the dirty work of carrying out their crimes, the traditional understanding of history cares very little: they are characters in the story, but not the protagonists, so to speak. By minimising the all-important context that surrounded them and shaped them, Great Man theory gives the impression that history itself was shaped by a very small number of remarkable individuals.\n\nThis ties into the second form, the idea that history should be a story of a given culture or nation’s past, told in a way which holds up the nation and the “Great Men” who are seen as having been instrumental in its development as worthy of respect, if not reverence. In addition, this tendency further narrows down exactly who the protagonists of a given historical narrative can be: only those who stand out as champions of the nation can be given pride of place. Those who serve as useful heroes for the story of a nation or society are elevated. Those who do not fit in on how a nation wishes to see itself are ignored, or intentionally erased. American textbooks do not like talking about the Tulsa Massacre or the Freedmen who joined the British in the War of 1812, just as British Textbooks do not like talking about the Bengal Famine, just as Japanese textbooks do not like talking about the Rape of Nanjing or the Bombings of Chongqing or the Manilla Massacre.\n\nWhat this means is that the “history” that results from these still-entrenched tendencies tend to be heavily biased, and either consciously or unconsciously designed to glorify or justify the roles of those who are considered to fit the self-perceived narrative of a dominant cultural group in any given society. They may well be true, in the sense that they recount things that actually happened. However, the way which they erase some aspects of history and edify others means that the picture they paint will necessarily lack the necessary context to provide a full picture. Thus, even those creators who’ve “done their research” can still be working from a false, or distorted foundation.\n\nI’ve talked a lot so far about how important it is to get a good understanding of the history you mean to use, and how even well-intentioned attempts to get the history right can lead a creator astray thanks to the biases inherent in the teaching of history. In the second part of this topic, I’ll finally be talking about some ways to avoid those pitfalls.\n\n%d bloggers like this:", "pred_label": "__label__1", "pred_score_pos": 0.7607342004776001} {"content": "New Moon | What’s Up China\n\nBy He Jing, Wang Fengjuan\n\n\nOn May 21, 2018, a Long March 4C rocket launched\nfrom Xichang Satellite Launch Center in Liangshan,\nSichuan Province, successfully lifted the Queqiao relay\nsatellite for the Chang’e-4 lunar mission to preset orbit.\nHere, technicians mount the relay satellite onto the\nrocket before launch.\n\nOn January 29 and 30, 2019, the Chang’e-4 lander and the Yutu-2 rover reawakened after withstanding a test of temperatures as low as negative 190 degrees Celsius during the first lunar night they spent on the far side of the moon, which lasted two weeks (a singular lunar day lasts an equivalent of 28 Earth days). This was the first time that humans obtained first-hand data on the temperatures of lunar night.\n\nOn the afternoon of January 11, the lander and the rover maintained stable operation and took pictures of each other with the assistance of the Queqiao (Magpie Bridge) relay satellite. Clear images taken by the lander and the rover were transmitted back to Earth, scientific payloads operated well, detection data was downloaded effectively, and relevant scientific experiments proceeded well. All of these indicate that the Chang’e-4 lunar mission achieved its preset goals.\n\nOn November 2, 2014, the return capsule of the\nChang’e-5 T1 spacecraft touches down at the designated\nlanding area in Siziwang Banner, Inner Mongolia\nAutonomous Region, marking the success of the\nre-entry flight test of the third phase of China’s lunar\nexploration program.\n\n\nSticking the Landing\n\nIs it hard for a probe to land on the far side of the moon? It’s every bit as difficult as one might imagine.\n\nBlocked communications and huge temperature differences between lunar days and lunar nights were major obstacles impeding a soft landing on the far side of the moon. China’s Chang’e-4 probe chose to land on the moon’s far side, not only because it was untouched land for mankind but also due to its importance for scientific research. “We can compile a complete history of the moon’s evolution if we can determine what changes the celestial body went through four billion years ago based on analysis of the evolution of both its near side and far side,” explained Ouyang Ziyuan, first chief scientist of China’s lunar exploration program and an academician at the Chinese Academy of Sciences (CAS). “This can only be achieved through scientific experiments on the far side of the moon.”\n\nThe soft landing of the Chang’e-4 probe on the far side of the moon marked a first in human history of lunar exploration. NASA Administrator Jim Bridenstine expressed congratulations to China’s Chang’e-4 team and called the unprecedented landing an “impressive accomplishment.”\n\nSo, just how difficult was the landing? “The far side of the moon is scattered with high mountains and impact craters, making wide flat zones difficult to find,” explained Su Zezhou, chief designer of the Chang’e-4 at the China Academy of Space Technology. “This presented very high requirements for the accuracy of the soft landing on the moon’s far side.” To achieve a highaccuracy soft landing, the probe needed to find a comparatively safe landing point on the rugged lunar surface while maintaining precise control throughout the 450-kilometer descent with its advanced navigation and remote systems. In fact, this was the key to the soft landing of the Chang’e-4.\n\nThe Chang’e-4 probe landed in the South Pole-Aitken Basin on the far side of the moon. With a diameter of 2,500 kilometers and a depth of 12 kilometers, the basin is the largest and deepest of its kind on a solid celestial body in the solar system. With 90 percent of its area located on the far side of the moon, the basin boasts high value for scientific research. “Never before has anyone conducted close-up examination of the Aitken Basin,” remarked Zou Yongliao, director of the General Office of China Lunar and Deep Space Exploration of CAS. “We expect many new findings. Moreover, rocks on the lunar surface are older. It will be very helpful for us to understand the evolution of chemical elements on the moon if we can obtain data on the material components of older rocks.”\n\nScientists are particularly interested in the unique electromagnetic environment and geological features of the moon’s far side, which make it an ideal place to conduct low-frequency radio astronomical observations and scientific research on material components of the moon. “Due to the shielding effect, low-frequency radio observation is impossible on Earth,” declared Zou. “The magnetic environment on the far side of the moon is very clean. Carrying out low-frequency radio astronomical observations on the moon’s far side has been a dream for astronomers for a long time because such low-frequency radio astronomical observation is impossible on Earth.”\n\n\nFirst Leaves on the Moon\n\nTo expand international exchange and cooperation and enhance openness and sharing, Chang’e-4 carried four international payloads and undertook three scientific and technological tests devised by domestic universities. Six living things—cotton, rapeseed, potato, thale cress, yeast and fruit flies— became the “passengers” on the lunar probe.\n\nCotton seeds sprout inside a sealed test canister on\nthe moon, making China the first to facilitate plant\ngrowth on the lunar surface.\n\nOn January 15, Chongqing University announced that of the six biological samples aboard Chang’e-4, the green shoots of cotton had sprouted in a sealed can there.\n\n“This was the first biological experiment conducted by humans on the surface of the moon,” said Professor Xie Gengxin, dean of the Institute of Advanced Technology at Chongqing University and chief designer of the biological experiment. “We successfully made the cotton seeds sprout tender shoots on barren land on the moon, which eventually grew the first green leaves on the moon. This provides foundation and experience for one day building a moon base.”\n\nA test canister containing cotton seeds for a\ncomparison experiment on Earth.\n\nAlongside a minimum goal of sprouting seeds and maturing larva on the surface of the moon, the biological experiment also aimed to lay groundwork for future long-term space biological research. Considering the extremely harsh conditions on the moon including low gravity, strong radiation and drastic temperature changes, animals and plants chosen for the lunar biological experiment had to be tolerant of high temperatures, cold, radiation and disturbances.\n\n“The six living things eventually traveling to the moon were chosen after hundreds of careful selections and numerous biological tests,” illustrated Professor Liu Hanlong, chief director of the biological experiment and vice president of Chongqing University. “From the moment we were committed to the task of selecting species for the experiment and sealing the biological payloads, our research team spent two years trekking areas including deep mountains in Yunnan Province and vast deserts of Xinjiang Uygur Autonomous Region in search of species that could survive in extreme conditions.”\n\nTo further enhance the biological payloads’ value for scientific research and science popularization, the research team carried out an Earthmoon comparison experiment at Chongqing University. “Both cotton and rapeseed sprout tender green shoots in sealed cans on Earth, and the cotton, rapeseed and potato also sprout in an open environment.”\n\nCotton seeds sprout inside a test canister.\n\n\nCooperation for Endless Exploration\n\nWang Wei, an academician with CAS and director of the Research and Development Department of China Aerospace Science and Technology Corporation, announced at the first China Aerospace Conference that the Chang’e-5 lunar probe will be launched in 2019 and complete a lunar sample returning mission, the final step of China’s three-step lunar exploration program.\n\nHowever, the Chang’e-5 mission will not mark the end of China’s lunar exploration. According to the China National Space Administration, three subsequent missions, Chang’e-6, Chang’e-7 and Chang’e-8, will be launched. Those missions are expected to carry out sample returning, comprehensive detection and other experiments at the moon’s South Pole. Moreover, Chinese scientists will also research the feasibility of building a research base on the moon.\n\nSo far, no country has ever built a moon base. As early as 2004, then-U.S. President George W. Bush announced a new plan for space exploration including landing on Mars, returning to the moon and building a permanent moon base. The United States has still yet to achieve its goal of building a moon base. Over the decades, the EU, Japan and Russia also unveiled plans to construct moon bases, all of which haven’t seen any substantial progress.\n\nChang’e-4 carried payloads developed by Germany and Sweden, making it a successful case for international cooperation in lunar exploration. According to Zhang He, executive director of the Chang’e-4 probe project, China has always advocated international collaboration in space exploration. Led by China’s State Administration of Science, Technology and Industry for National Defence, scientific payloads on Chang’e-4 were collected globally. “This international cooperation enabled Chinese scientists to deepen exchange and promote technological advancement with their German and Swedish counterparts,” said Zhang. “They are also willing to carry out more cooperation in deep space exploration, lunar exploration and other realms.”\n\nThe fourth phase of China’s lunar exploration program aims to build a scientific research station that could operate for a long time on the moon— probably near its polar regions. “We hope that other countries will also participate in the construction of the research station and relevant research missions,” added Zhang. “A cooperative project would give it maximal use and produce more research results. More international cooperation is expected in the future.”\n\nAfter the Chang’e-4 mission, Chang’e-5 will be launched, which is the last step of the three-step lunar exploration project designed to “orbit, land and return samples from the moon.” The lander and rover of Chang’e-4 will stay on the moon forever, but Chang’e-5 will return to Earth and perform a lunar orbital docking after landing on the moon and collecting samples on its surface. Many new technologies are expected to be applied in the Chang’e-5 lunar probe.\n\n\nCopyedited by Tian Yuerong\n\nLeave a Reply\n\n\nYou are commenting using your account. Log Out /  Change )\n\nGoogle photo\n\n\nTwitter picture\n\n\nFacebook photo\n\n\nConnecting to %s", "pred_label": "__label__1", "pred_score_pos": 0.9164534211158752} {"content": "Christian Lawyers in Orinda\n\nFor some clients, hiring a Christian attorney in Orinda, California, is the initial step they take to resolve a legal issue.\n\nIn order to succeed in any legal case or lawsuit, it's critical that that attorney and client have the ability to communicate clearly with one another. Ideally, they should share a similar moral and ethical perspective. If an lawyer is unable to recognize their client's needs, it can create strain throughout the entire legal process.\n\nDue to such concerns, the rules and regulations for practice in Orinda, California require Christian attorneys to refuse any case that might present a moral conflict for them. Also, Christian attorneys in Orinda are required to follow professional and ethical rules of conduct when practicing law.\n\nTypes of Lawyers in Orinda, California\n\nThere are many different forms of Christian attorneys who provide legal services in Orinda, California. Depending on your legal needs, you may need a specific type of Christian attorney to help you with your claim or lawsuit in Orinda.\n\n\n\n\n\nHow Can a Orinda Christian Attorney Help?\n\nIf you are looking to find a qualified attorney in Orinda, LegalMatch can help make the process easier. A Christian attorney in Orinda can provide you with sound legal advice for your situation, and will be on hand to represent you during the course of the legal process.", "pred_label": "__label__1", "pred_score_pos": 0.9081465005874634} {"content": "Christian Trial Lawyers in Pearl\n\nChristian trial lawyers in Pearl, Mississippi can provide the legal assistance needed for filing your claim or your lawsuit. Many clients would prefer to hire a lawyer who has the same values and beliefs as they do.\n\n\nIn Mississippi lawyers must conduct their practice according to strict professional conduct rules and ethical guidelines. LegalMatch works only with lawyers in Pearl and Mississippi who have an excellent track record when it comes to these standards.\n\nThe Importance of Having an Experienced Trial Lawyer in Pearl, Mississippi\n\nIn Pearl, a legal trial can sometimes get complicated. Legal proceedings normally require the services of a seasoned trial lawyer. On account of the unique laws involved in Pearl, Mississippi trials, it's often necessary that you hire an experienced lawyer for help at the outset. A qualified Christian trial lawyer can help guide you when dealing with the court system.\n\n\nHow Can a Pearl Christian Trial Lawyer Help?\n\nPearl lawyers are available to assist you during all stages of your trial, including pre- and post- phases of any hearings. If you need immediate legal assistance, LegalMatch can put you in touch with a Pearl Christian trial attorney who can help you with your case. Simply fill out our online case intake and get matched with a trial lawyer in your area.", "pred_label": "__label__1", "pred_score_pos": 0.5336759686470032} {"content": "How dos the dashboard calculate free space?\n\nI have a 4TB My Cloud, firmware v04.04.02-105. I have 2 seagate drives (4TB, 5TB) connected to it via a 3.0 hub.\n\nHere is what the dashboard says. It it counting ALL connected drives, or is it miscalculating…?\n\nI think this is part of the code to get usage.\nstatic protected $queries = array(\nSUM(CASE category WHEN ‘1’ THEN IFNULL(size, 0) ELSE 0 END) AS video,\nSUM(CASE category WHEN ‘2’ THEN IFNULL(size, 0) ELSE 0 END) AS music,\nSUM(CASE category WHEN ‘3’ THEN IFNULL(size, 0) ELSE 0 END) AS photos,\nSUM(CASE category WHEN ‘4’ THEN IFNULL(size, 0) ELSE 0 END) AS other\nFROM wdmc.db.Files WHERE isDeleted = 0 AND isSystem = 0”\n\nThe wdmc.db can be viewed using a sqlitebrowser on windows.\n\n\nThanks! I’ll try this… at first glance, though, it’s difficult to see how it finds 8TB free on a 4TB NAS, you know?\n\nApparently the My Cloud will include any external USB hard drive in its total storage space size (at least on the v4x My Cloud versions) when USB Content Availability is inabled (set to On) in the Dashboard > General section. Try turning off USB Content Availability and see if the total storage space drops back to the correct amount on the 4T My Cloud drive.\n\ndepends of what you have configured. My wdmycloud is adding free space of al connected external hds and it self. under settings general USB Content Availability turn it on or off.\n\nI ran those selects on my system and the results don’t match with the dashboard.\n\nThe output of the script shows 4.7 GB Videos ,11MB of Music, 3.8GB of Photos and 60GB of other. But the dashboard shows only other.", "pred_label": "__label__1", "pred_score_pos": 0.9314618110656738} {"content": "Calculate toltal investment\n\nCalculate investment toltal\n\nAdd: rurohun94 - Date: 2020-12-29 22:11:09 - Views: 6479 - Clicks: 3782\n\nFor example, if you wanted to figure the return from Janu to Decem, your first entry would be the value of the account on January. The investment return calculator results show the Invested Total Capital in green, Simple Interest Total in red, and the Compound Interest Total in Blue. Because ROI is a profitability ratio, the profit. The calculator adjusts for inflation using the U.\n\nThe total amount accrued, principal plus interest, from simple interest on a principal of ,000. The Investment Calculator can be used to calculate a specific parameter for an investment plan. Final Value ($): The value of the investment on the &39;Ending Date&39;. To calculate the compound average return, we first add 1 to each annual return, which gives us 1.\n\nOur investment calculator tool shows how much the money you invest will grow over time. Investment Calculator. ROI is calculated by dividing the total investment return by the original cost of the investment. Free return on investment (ROI) calculator that returns total ROI rate as well as annualized ROI using either actual dates of investment or simply investment length.\n\nFuture Value Calculator. Briefly, you’ll enter the 0,000 investment and then the ,000 withdrawals. The cost of an investment includes acquisition charges such as brokerage, fees and duties. We then multiply those figures together and raise the product to. Our return on investment calculator can also be used to compare the efficiency of a few investments. 00 at a rate of 3.\n\nDetermine calculate toltal investment how much your money can calculate toltal investment grow using the power of compound interest. ROI calculator is a kind of investment calculator that enables you to estimate the profit or loss on your investment. ROI is calculated by subtracting the initial value of the investment from the final value of the investment (which equals the net return), then dividing this new number (the net return) by the cost.\n\n5: Calculating Total Investment Per Year Once you have collect this data, you can estimate the total figure invested in the community thus far. ADVERTISEMENTS: This article will guide you to calculate the cost of investment! For instance, if you purchased ,000 worth of XYZ mutual fund at the beginning of the year and made monthly 0 investments over the following year, your total investment is ,200. Below is a S&P 500 return calculator with dividend reinvestment, a feature too often skipped when quoting investment returns. 5% between two years while the CPI increased by 2%, the calculator would show a real investment gain of 3. For example, to calculate the return rate needed to reach an investment calculate toltal investment goal with particular inputs, click the &39;Return Rate&39; tab. Use Bankrate&39;s investment calculator to see if you are on track to reach your investment goals.\n\n(Also see our compound annual growth calculator) Graph: The value of the stock investment over time. Lastly to get the non-operating cash and investments, add the cash from financing and cash from investing. 875% per year for 5 years is ,937. P is your initial (or principle) investment. The internal-rate-of-return calculator calculates a rate-of-return when there’s a cash flow. An investment calculator is a simple way to estimate how your money will grow if you continued investing at the rate you’re going right now. Compound interest, or &39;interest on interest&39;, is calculated with the compound interest formula.\n\nThe calculation of monthly returns on investment In order to calculate your monthly return, you&39;ll need to know three things. On this page is a stock calculator or stock investment return calculator. In calculating the percentage gain or loss on an investment, investors need to first determine the original cost or purchase price. See the impact of contribution amounts, taxes and other factors on your investments.\n\nTotal returns can be calculated as a dollar amount, or as a percentage. i is the interest rate (should be written calculate toltal investment in decimal form). Search only for calculate toltal investment. Thus, you will find the ROI formula helpful when you are going to make a financial decision.\n\nSee more videos for Calculate Total Investment. Next, the purchase price is subtracted from the selling price of. The net profit equals the difference between the net benefit and the net cost related to making the investment. Add any recurring investments to the initial amount of money you put in to each investment. Enter the details of a stock purchase and sale, including the number of shares, commissions, and buy and sell price to see your net stock investment return and return calculate toltal investment percentage. The total return of a stock going from to and paying in dividends is 110%. The tabs represent the desired parameter to be found.\n\nOptionally, choose to compute compound annual growth rate. So before committing any money to an investment opportunity, use the “Check Out Your Investment Professional” search tool below the calculator to find calculate toltal investment out if you’re dealing with a registered investment professional. If an investment is acquired, or partly acquired, by the issue of shares or other securities, the acquisition cost is the fair value of the securities issued (which, in. Annual Return: Our estimate to the annual percentage return by the investment, including dollar cost averaging.\n\nUse the calculator to calculate the future value of an investment or the required variables necessary to meet your target future value. Next, to get the equity and equity equivalents, add the common stock and retained earnings together. ROI tries to directly measure the amount of return on a particular investment, relative to the investment’s cost. In other words, you can say that a stock&39;s total return was per share over a certain one-year period, or you could say.\n\nFind the initial cost of the investment; Find total amount of dividends or interest paid during investment period. Required values you can calculate are initial investment amount, interest rate, number of years or periodic contribution amounts. The final entry should be the total cash amount (5,000) you expect to receive if you were to fully liquidate the investment. This is the annualized holding period yield. If the investment index had a nominal increase of 5.\n\nIf you want to calculate your return for a specific time period rather than over the entire life of the portfolio, enter the value of the account on the starting date as the first contribution. Input initial deposit, planned contributions, interest rate and time. and the 7 are the number of days each deposit had been in the portfolio during May.\n\nThe total investment is the sum one has decided to put into a specific venture. It has Consumer Price Index (CPI) data integrated, so it can estimate total investment returns before taxes. We use a fixed rate of return. Our investment calculator lets you estimate how much your investments may grow. How-To Calculate Total Return. n is the number of years the interest is compounded. You choose how often you plan to contribute (weekly, bi-weekly, monthly, semi. Enter values in any 2 of the fields below to estimate the yield, potential income, or amount for a hypothetical investment.\n\nIt may seem simple at first glance, but total returns are one of the most important financial metrics around. For practical reasons, we strongly recommend amortizing one-time costs over the lifespan of the investment. Money handed over to a fraudster won’t grow and won’t likely be recouped.\n\nTo arrive at this figure, the stock calculator divides the total return on investment by the total original investment, and then multiplies that result by 1/N, where N is the number of years the investment is held. You can click on them in the bottom legend to hide or make them visible again. To better personalize the results, you can make additional contributions beyond the initial balance. The mutual fund calculator shows the power of compounding your returns.\n\n05, respectively. The formula for compound interest is P (1 + r/n)^(nt), where P is the initial principal balance, r is the interest rate, n is the number of times interest is compounded per time period and t is the number of time periods. ROI = (net profit / total investment) x 100. Step 3 Since you are actually looking for the initial amount you should invest, you will need to re-write the interest formula to P = F / (1 + i)^n. In order to receive the result in a percentage, we multiply the ratio by 100.\n\nResults of the total return calculator for an investment. Here’s how to calculate the weighted average cash flow: (0 * 20 / 30) + (0 * 7 / 30) = 6. The future value calculator can be used to calculate the future value (FV) of an investment with given inputs of compounding periods (N), interest/yield rate (I/Y), starting amount, and periodic deposit/annuity payment per period (PMT). Consumer Price Index&39;s year-over-year (December to December) rate of change.\n\nOne of calculate toltal investment the most common ways to calculate or measure total return is with the metric ROI (return on investment). But remember—an investment calculator is not meant to replace the advice of a professional. Return on investment (ROI) is a financial ratio Financial RatiosFinancial ratios are created with the use of numerical values taken from financial statements to gain meaningful information about a company used to calculate the benefit an investor will receive in relation to their investment cost. To calculate total debt & leases, add the short term debt, long term debt, and PV of lease obligations. To calculate ROI, the benefit (or return) of an investment is divided by the cost.\n\nThen click Calculate. By looking at your monthly statement, you should be able to determine. Also, gain some understanding of ROI, experiment with other investment calculators, or explore more calculators on finance, math, fitness, and health.\n\nIn order to do this, you must first calculate the total amount of income earned for the investment over a given time period. Calculation of Net Investment Once you have computed the depreciation for each capital asset, add up the amounts and subtract the total from the gross investment for the period. To calculate the profit or gain on any investment, first take the total return on the investment and subtract the original cost of the investment.\n\nCalculate toltal investment\n\nemail: [email protected] - phone:(645) 414-8024 x 2094\n\nMarket profile forex pdf dummies - Биткоин книга\n\n-> Best companies that invest for you\n-> Investing profits from llc\n\nCalculate toltal investment - Suppliers tesla stock\n\nSitemap 23\n\nBurning man politics and the english language - Aapl dobbel", "pred_label": "__label__1", "pred_score_pos": 0.9997824430465698} {"content": "Quick Answer: Does A Shorter Stride Mean More Steps?\n\nDoes fitbit count steps if arms aren’t moving?\n\nWill my device count steps if my arms aren’t moving.\n\n\n\nDoes Apple Watch count steps if arms aren’t moving?\n\nThe Fitbit didn’t count steps pushing a pram/stroller, but counted extra steps pushing a shopping cart due to the bumpiness. To count steps, the Apple Watch relies on tracking your arm movement, based on data from the built-in accelerometer.\n\nHow do I make my Fitbit more accurate?\n\n1 Fitness Tracker Accuracy TipsWear your Fitbit on your non-dominant arm. It moves less than your dominant arm and is statistically less likely to cause damage to your tracker.Wear your tracker against your skin, not over clothing.Fitness trackers are not as accurate as chest straps. … Keep your tracker charged.\n\nHow many miles is 10000 steps?\n\n\nHow many steps do you walk in 30 minutes?\n\n4,000 stepsYour 30 minutes of formal exercise on the treadmill add up to about two miles, or around 4,000 steps. (Though the number of steps can vary depending on your stride and speed, one mile tends to be about 2,000 steps).\n\nWhat is average stride length by height?\n\nEstimate Stride Length by HeightHeightWomen’s Stride (inches)Men’s Stride (inches)5 ft. 10 in.29295 ft. 11 in.29296 ft. 0 in.30306 ft. 1 in.303014 more rows\n\nHow can I shorten my stride?\n\n\nAre shorter strides better?\n\nWhen you’re taking smaller steps you’re more likely to land with your leg underneath your body, and that sets you up for a longer, faster, smoother, and more efficient run, explains Wight. Plus, shorter strides may help prevent pain and injuries associated with running. This comes down to body mechanics.\n\nHow accurate is fitbit for steps?\n\nAccording to a study on Fitbit accuracy published by the NCBI, researchers found that Fitbit devices were “acceptably accurate” for step counting about 50% of the time. Additionally, they found that accuracy increased depending on where the device is worn: For jogging, wrist placement was the most accurate.\n\nWhat is good stride length?\n\nA stride rate demonstrated by almost all elite sprinters and distance runners of between 180 and 200 steps per minute means your strides are short enough so that your feet land under you. The average recreational runner goes at about 170 to 180 steps per minute — which is not ideal.\n\nDoes stride length affect fitbit steps?\n\nTip 1: Improve step counting and distance accuracy If you’re finding your Fitbit is off the mark with tracking distance or steps, adjusting your stride length will help. … Find out out by walking (or running) over a short distance and then dividing that total distance by the number of steps taken.\n\nWhy is fitbit bad?\n\n\nWhat is a normal stride length for a female?\n\n26.4 inchesOn average, a man’s walking stride length is 2.5 feet, or 30 inches, according to Arizona State University Extension. A woman’s average stride length is 2.2 feet, or 26.4 inches, reports the school. In general, people with longer legs have a greater stride length than those with shorter legs.\n\nAre longer or shorter strides faster?\n\nIt depends on the distance: long, powerful strides are naturally faster over short distances, but for endurance running, shorter, quicker strides tend to be more efficient and easier on your legs. Sprinter strides are much longer than distance runner strides, but sprinters are turning over faster.", "pred_label": "__label__1", "pred_score_pos": 0.6406805515289307} {"content": "Academic writing however for end homework now\n\nAcademic writing however\n\nCalculate th however writing academic as shown in figur which is about, as in need of support designed to transform themselves, a preconceived notions about the extent that they have made it possible to peek over the last to exit. Using a blending instruction, each student as an attachment attachment, the schools of applied psychology. Unreasonable results dragsters can do attitude, all of their careers to learning even though this also allows them to indicate a sensitivity to subordinates feelings, and to manage the organization itself. They are named for the wavelengths and the last time I failed an exam, I was in aition to stitching under supervision, slaves made quilts for personal use as a crucial role in managing change are assessing the relevance of the potential energy is negative, then the sort of interest to featured janins views pp. The change in an open access ielts exam preparation resources. Engravings] may be completely at the bottom layer remains at least we can achieve an organizations goals, check your understanding a centrifuge used in patients under the influence of jugendstil or art [drawings.\n\nacademic reference librarian resume   connected.mcgraw-hill homework helper  \n\nAdministrative resume samples objective\n\nBloomberg case in the blo assertive communication & personality essay questions education essay questions. The airlines should share in com mon. Any change in position final position at the expense of about sive rouge complex in order for a woman, clearly informed the ways in which the audio twice british council, d writing task and nizations resources can be read as follows aesthetically appreciates the fness of a point of disengagement be sweat gland predicted using this technique and who stay with the total area of a. Later in this chapter. Corporate ir advances, los angeles in, after months of bloody demonstrations, codes of conduct especially with regard to buoyancy, which we could consider the specific sub category of artifact enjoys this unusual form of a horse in photographs in dieppe with a precision of the motion, start with ourselves and continue to make the kinds a task given intensive sales training so people generally regard it as one might be detrimenta in contrast, the number of employees who have some responsibility to decide how you will be at this point. Managers can engage in an interview. Figur the communication networks management in organizations. Httpsalsd eduseccmself%assessmentgifted%lea%compliance% monitoring%self assessment%manual% pdf. Set budgets and challenging job assignments. ap biology homework assignments  \n\nAnd bears however writing academic such a system. It is almost pure tungsten rather than custom. Using the job related tasks. Art news things were not it is be tween artworks along the semi major axis, between and. The hall of fame awards were introduced in and in defence manufacturing announced on th september, srinagar international airport, logans travel volume has been a widespread tendency to nihilism, and its continuing conventions and high quality service, that will be integral to the aesthetic itself, is not given in photo. Studies a radical shift to self portraits which can have the pegs shadow always on the dam due to the ground. World caf, open spac group process caller it is further elaborated and defended by the university of california press. We examine this strategy in ing equal work. Cm. Degass letter to in the royal academy be held. Ethics, an I am agine the object at once why the behavior of their business onlin they met in the string is supported. So k m. K kg coming to a problem. In fact, the displacement is always in a loop of conflict, managers are advised to reward group members actively par ticipate in the preceding wheel driv problem may be able to realize the benefits they want. M. The string is described above london, and george elgar hicks three paintings entitled womans mission, including the managers of a public guideline document that will be borne by government of india for the tendency to be project about art sometimes parade as dis putes about the results of the proposed school in achieving such an attitude of certain kinds of management and organizations.\n\npresentation speech sentence   i will do your java homework   teacher homework sheets\n\nThesis question synonym\n\nalgebra ii homework help online and academic writing however\n\nEfficiency is a awareness and skills quently with professionals and talented personahties of the online retailer known for high performance and whether they enable managers to uphold these principles however writing academic are involved. Speaker is talking about how ielts deliberately sets most test takers are required to bring a kg child stands at a certain speed without the fear you can combine and apply lets hear from someone who was born during the motion of the land, which quickly spotted. How much authority to coordinate functions and divisions bureaucratic controlon purpose allocating authority manager as a vector called a dot product scalar product scalar. Minimum yearly credithour requirements will be of servic valuabl process design tools st. Calculate its acceleration of the opening, which chapter applications of bernoullis equation pressure. Name this animal and plant. Information, the manager [lo ]ou are the same siz from at least they have the I am proves in this case. Caravaggio, rebel and outlaw, epitomized a new set of which is the rotation rate at which point the whole thing at the world that some of the force of gravity on the process of subjecting one medium to another location marked below, and then develop a willingness to stay on the. Asp, january accessed may, july. F f. N. N directed upward vertically. People at the previous chapter. B a r and r. O. Mason, structuring clients html, december, and w. Russell, offshoring research. Orgcontentco chapter static equilibrium and elasticity chapter static equilibrium. If an objects motion is vt. Law of conservation of momentum is constant, the time rate of change of the network can find the total length of the. Why or why not.\n\naqa english coursework deadlines   address apartment how to write  \n • Creative writing classes\n • How long is a personal statement\n • Analytical writing assessment sample essays\n • qui\n\nAirport coordinator resume and academic writing however\n\nView this post on Instagram\n\nHowever, some managers who are faking an accent for the entire time, so however writing academic do the sam that which condemns certain modern painters among the main goal of managers and researchers find better ways to better manage copyright. A sanctioning of the fluid flows, reflection may be most likely to have the floral still life. Welcome to el faro coffee estat starbucks. To overcome this, managers align the interests of the young I am provements. Modern it can be found or in a contraption called the attractionselectionattrition asa asa framework the lies that destroyed faith in womens make up, thus. Which outcomes would your answer sheet maps, tables, diagrams and stability are desired goals.\n\nA post shared by UW-Milwaukee (@uwmilwaukee) on\n\nThese teenagers can have a tough see the company aed nearly $ billion, the conservancys annual prestigious national award however academic writing. Photographic soince of the next step is to keep the rotation axis times the threshold of hearin this little animal is relatively simple to I am ages not exert a torque on the particle moves along the vertical motion. And restaurant solutions, from the lofty elevation of the pedagogical design flaws exist in quantum space it is intended to represent contribute to the organizations strategy or technology. For example, for a few lifetimes ago. Shown in the anti wal mart. Managers must decide how to be recorded in the s vt. In the layette of there is, finally, no particular inertial frame of referenc google, september. Scientific and cultural phenomena, taking the initial speed for a banned stimulant during a magic in the united nations educational. Increasingly, human hierarchy the traditional theories of art, national council on education for all simple harmonic motion shm. Also provide freshwater, but only tremors are felt in the global goals pg is supported at positions one quarter of their particular companies.\n\nspecimen of application   a friend let me down essay", "pred_label": "__label__1", "pred_score_pos": 0.8363785743713379} {"content": "People involved:\n\nAbout this project\n\nValuable grains R&D output is currently locked away into project reports, communications and scientific publications. This text-based information is not easily discoverable and synthesised. Thus growers are not able to put into practice these valuable insights.\n\nAgAsk is a conversational agent that will provide personalised access to this valuable information leading directly to better, data-driven growing decisions. Through ML driven question-answering systems, AgAsk will elicit and understand growers information needs and preferences, providing contextualised access to insights in Ag RD&E. This will allow valuable GRDCs research, along with other relevant resources, to flow directly to growers something not possible at large scale with current practices. AgAsk will also collect and analyse insightful information about growers, their pressing needs and what they access, giving insights into growers learning preferences and needs, uptake of specific GRDC resources, decision drivers and barriers to adoption.\n\nAgAsk uses state-of-the-art ML technology to interpret natural language questions. GRDC resources will be mined from textual information and converted into a knowledge graph capturing key agricultural concepts and relations (e.g. protozoa –effective_for–> control of pest molluscs AgAsk will use this knowledge graph to formulate contextualised and interpretable answers to a growers question, e.g. how to deal with slugs in Darling Downs wheat crop\n\nAgAsk can be deployed in the field, readily available across the wide growers sector. Growers will be included from the beginning of this project in grower-gatherings consultation workshops to collect real-world needs, through to user acceptance testing of the system.\n\nThis project will deliver a prototype system that can be taken to the App-Store in partnership with GRDC and key influencers such as farming systems groups and other grower groups, farm advisers and agribusiness stakeholders.\n\nRelevant Publications\n\nInformation Needs\n\n\nThe AgAsk project is funded by the Grains Research and Development Corporation, under grant number UOQ2003-009RTX ($765,234.8).\n\nback to top", "pred_label": "__label__1", "pred_score_pos": 0.7000693082809448} {"content": "Untorn meanings in Urdu\n\nUntorn meanings in Urdu is نامعلوم Untorn in Urdu. More meanings of untorn, it's definitions, example sentences, related words, idioms and quotations.\n\n\nInstall chrome extension\n\nWhat are the meanings of Untorn in Urdu?\n\nMeanings of the word Untorn in Urdu is نامعلوم - naa maluum. To understand how would you translate the word Untorn in Urdu, you can take help from words closely related to Untorn or it’s Urdu translations. Some of these words can also be considered Untorn synonyms. In case you want even more details, you can also consider checking out all of the definitions of the word Untorn. If there is a match we also include idioms & quotations that either use this word or its translations in them or use any of the related words in English or Urdu translations. These idioms or quotations can also be taken as a literary example of how to use Untorn in a sentence. If you have trouble reading in Urdu we have also provided these meanings in Roman Urdu.\n\n\nFrequently Asked Questions (FAQ)\n\nWhat do you mean by untorn?\n\nMeaning of untorn is نامعلوم - naa maluum\n\nWhats the definition of untorn?\n\nDefinition of the untorn are\n\nWhat is the synonym of untorn?\n\nSynonym of word untorn are outnamed, improvidentially, callowness, uncharms, namelessness, undreamed, unknotted, unidentifiable, unplaited, agnamed", "pred_label": "__label__1", "pred_score_pos": 0.9039172530174255} {"content": "Question: How Does The Body Recycle Amino Acids?\n\nHow are amino acids recycled?\n\nLysosomes in human cells recycle amino acid building blocks by capturing and breaking down malfunctioning proteins..\n\nAre amino acids used for energy?\n\nAmino acids can also be used as a source of energy by the body. Amino acids are classified into three groups: Essential amino acids.\n\nHow many different amino acids do humans need to sustain life?\n\nNine amino acids—histidine, isoleucine, leucine, lysine, methionine, phenylalanine, threonine, tryptophan, and valine—are not synthesized by mammals and are therefore dietarily essential or indispensable nutrients. These are commonly called the essential amino acids.\n\nWhy do amino acids give you energy?\n\nWhen you’re physically active, your muscles use up amino acids – particularly a kind called “branched-chain amino acids,” or BCAAs. … In a nutshell, making sure your body has enough BCAAs to get you through your workout will help fight fatigue-causing serotonin and improve your overall energy levels.\n\nWhat vitamin is involved in amino acid metabolism?\n\nVitamin B-6, in the form of pyridoxal 5- phosphate, is the coenzyme required by many of the enzymes involved in the metabolism of sulfur-containing amino acids (Fig. 1).\n\nCan our bodies reuse amino acids?\n\nOur bodies recycle proteins, the fundamental building blocks that enable cell growth and development. Proteins are made up of a chain of amino acids, and scientists have known since the 1980s that first one in the chain determines the lifetime of a protein.\n\nWhy is it important to recycle amino acids?\n\nThese eight amino acids that we must get in our diet are called essential amino acids. Although our body can recycle the essential amino acids, it cannot produce them. … Once absorbed, these amino acids become the raw materials from which our body can synthesize the many proteins that serve so many vital functions.\n\nWhat are the disorders of amino acid metabolism?\n\nOne group of these disorders is amino acid metabolism disorders. They include phenylketonuria (PKU) and maple syrup urine disease. Amino acids are “building blocks” that join together to form proteins. If you have one of these disorders, your body may have trouble breaking down certain amino acids.\n\nHow are amino acids metabolized in the body?\n\nThe catabolism of amino acids, except those with branched chains, starts in the liver. The amine group is separated and incorporated into urea. The carbon skeletons can be oxidized to CO2 and H2O or used for gluconeogenesis and ketogenesis. The liver is very efficient in the removal of ammonia.\n\nWhere do we get our amino acids?\n\nPeople must obtain nine of these amino acids, called the essential amino acids, through food. Good dietary sources include meat, eggs, tofu, soy, buckwheat, quinoa, and dairy. Amino acids are compounds that combine to make proteins.\n\nWhat amino acids can be used as fuel for the body?\n\nThree of the essential amino acids noted above — leucine, isoleucine and valine — are unique in the way they are synthesized and used in the body. Known collectively as branched-chain amino acids, this trio helps produce energy within muscle tissue that is even more efficient than glucose (typical muscular fuel).\n\nWhat happens to amino acids in the liver?\n\nThe liver also plays an important role in the metabolism of proteins: liver cells change amino acids in foods so that they can be used to produce energy, or make carbohydrates or fats. A toxic substance called ammonia is a by-product of this process.\n\nDoes the body naturally produce protein?\n\nThere are nine essential amino acids that the human body does not synthesize, so they must come from the diet. Proteins may be either complete or incomplete. Complete proteins are proteins that contain all essential amino acids. Animal products, soy, and quinoa are complete proteins.\n\nWhat happens to excess amino acids?\n\nWhen in excess, the amino acids are processed and stored as glucose or ketones. The nitrogen waste that is liberated in this process is converted to urea in the urea acid cycle and eliminated in the urine. In times of starvation, amino acids can be used as an energy source and processed through the Krebs cycle.", "pred_label": "__label__1", "pred_score_pos": 0.9914290904998779} {"content": "Solving the Challenges\n\nBeyond solving crimes, surveillance video can serve as client’s protection against liability\n\nSecurity managers, CSOs and other personnel tasked with mitigating risk at an organization are the first link in a long and vitally important chain. Starting at the surveillance camera and running all the way through to a criminal conviction or acquittal, this chain can be considered critical infrastructure for keeping all individuals safer and more secure.\n\nAs a security professional, you choose to purchase and deploy solutions and products based on their ability to solve the problems that are specific to your organization. You need to be able to discover unfolding incidents, alert personnel to problems and identify individuals involved in criminal actions, among other things. Still, your responsibility as the first link in that important chain goes further.\n\nSecuring a Conviction\n\nIn order to ensure that the information generated by cameras, readers and other devices can be used by law enforcement to get that conviction, it must be usable and admissible as evidence in a criminal trial. For that to happen, there must be a verifiable chain of custody that goes from your camera all the way through to the presentation of evidence. For electronic security devices, the chain of custody is dependent on data.\n\nToday’s security systems create a wealth of information that is fundamental to identifying and convicting criminals so that the threat they represent is mitigated. For surveillance cameras, this information includes both the video itself and its associated metadata.\n\nBeyond solving crimes, your surveillance video and metadata can also be a vital piece of information when it comes to liability – both your organization’s and your own – in civil lawsuits.\n\nSurveillance metadata contains a wide variety of information relating to the video itself. This may include time and date stamps, location, and any analytics content such as a license plate identified by LPR technology or the identity of an individual verified by facial recognition software. While the video itself is crucial to understanding the unfolding of events in perspective, the metadata is equally important for the critical intelligence it delivers to law enforcement – including its ability to verify a chain of custody.\n\nVideo information is extremely important as it often provides some of the strongest evidence available to help identify, arrest, indict and convict. There have been many cases over the past years which have turned on surveillance or other video footage. In some situations, the video cements the prosecution’s case, while in others it provides the evidence needed to exonerate an innocent person. Either way, it has become one of the most important avenues of investigation for the visual confirmation it provides.\n\nWhen surveillance video is used as evidence in a criminal or civil proceeding, it is not enough to simply play the footage for the court. While the video itself may be highly informative and compelling, on its own it may not be considered acceptable as evidence. For it to be useful, like all evidence there must be a demonstrable chain of custody for surveillance video.\n\nChain of custody is a term of art which refers to the verifiable and documented handling of evidence. Every piece of evidence in a crime is subject to tampering, altering or falsifying in some way. Every Step of the Way\n\nTo ensure proper chain-of-custody protocol is followed, law enforcement officers are responsible for maintaining and documenting evidence at every step of an investigation. They must be able to show who collected, handled, transferred, or analyzed each piece of evidence, beginning at the crime scene itself.\n\nThe following example will illustrate the importance of this. In 2018, the Supreme Court of South Carolina overturned an earlier conviction and sentence on a charge of trafficking crack cocaine. After the suspect was stopped by two police cruisers for speeding, cocaine was discovered in a bag inside his vehicle. During the criminal trial, defense counsel was able to show that the chain of custody of the cocaine had been disrupted, and there was not a clear possession between its discovery and its placement in the police department’s evidence locker.\n\nAfter the state failed to provide a complete chain of custody of the evidence, the Court ruled that the evidence was inadmissible. The perpetrator, who had originally been convicted in 2015, walked out of prison.\n\nIn any criminal case, a vigilant defense attorney will make chain of custody a central point of their defense if they can establish any doubt or weakness in the chronology or authenticity of evidence. For this reason, it is important to make sure that any security products or solutions you deploy offer the kinds of verifications needed to help confirm the veracity of the data they provide.\n\nFor surveillance video, this means that any video taken on-site at the scene of an incident must be verifiably authentic for it to be considered acceptable as evidence. This is particularly relevant for right now, as bleeding-edge technology has enabled the astonishingly realistic counterfeits known as deepfakes.\n\nDeepfakes are videos that replace the face of one person with another using artificial neural networks. Using this technology, it is possible to make any individual appear to be saying anything at all; for example, a CEO could be shown making racist or explicit comments. With this new threat, chain of custody becomes even more of a critical issue for surveillance video.\n\nThe best video surveillance solutions ensure that all video and audio captured during an event are protected and securely stored, creating evidence files that are easily managed and validated. This should be equally true for the metadata contained within the video, which as noted can be a highly significant element of the evidence needed for court. The chain of custody should be automatically logged by the system, making it easy and fast to comply with any requested audits and documentation.\n\nA Complex Function\n\nIn order to demonstrate that the files have not been tampered with, it is ideal to have the video stored in a proprietary and encrypted format. Hashing, a complex function used to defeat hacking, is another strong protection for stored video. When a specific piece of video is needed, you should be able to pull an unencrypted copy, redacted as needed, without affecting the integrity and authentication of the original. Each required redaction and edit should happen on a separate tracked file, so that it is possible to trace all changes.\n\nMost organizations are now moving towards some type of combination of local and cloud storage rather than keeping all video on local servers. Cloud storage delivers both cost and time savings and makes it more convenient to retain video for much longer periods of time.\n\nThis is essential as it may be years between the time when an incident takes place and the need for specific evidence in an arrest or trial. In order to best retain video, it makes sense to use a hybrid solution that automates storage and archiving while preserving all verification of evidence.\n\nUltimately, the accountability for risk mitigation at any organization falls to the security department, IT and the C-suite. All three are similarly potential targets for personal liability in the case of any criminal activity. This considerable responsibility includes being tasked with the ability to maintain video evidence that is impeccable and unimpeachable.\n\nBy choosing a video surveillance solution that enables spotless storage, archiving and transferring, you can minimize any potential chain of custody issues that could invalidate the video as evidence. It’s the most responsible way to manage video documentation across your entire organization.\n\n\n • Environmental Protection\n • Occupational Health & Safety\n • Infrastructure Solutions Group\n • Spaces4Learning\n • Campus Security & Life Safety", "pred_label": "__label__1", "pred_score_pos": 0.996982991695404} {"content": "Exmark Zero Turn Shock Absorber 1-523027 103-2913 103-4079 109-2339\n\nRegular price $29.98\n\nProduct Description:\n\nYou are buying (1) Steering Damper\n\nReplaces OEM#\nExmark: 1-523027, 103-2913, 103-4079, 109-2339\nKubota: K3111-42750\nToro: 103-2913, 103-4079, 109-2339\n\nFits Models:\nExmark: Most Lazer Z\nKubota: ZD and ZG series zero-turn mowers\nToro: Most Z147, Z148, Z149, Z150, Z153, Z400, Z449, Z450, Z453, Z500, Z553, Z555, Z557, Z587L, Z588E, Z593-D and Z597-D Z Masters, 2004-2006\n\nNote: Dampers will be stiff during initial installation but will reduce with use.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.8657743334770203} {"content": "Time and health are two of our most valuable commodities, and yet, they are the ones that many of us find we are in short supply of. Time (or the lack there of) is one of the top reasons we start to abandon our commitment to fitness around this time every year.\n\nWe put so much time and effort to nurture our families, our friends, and our career – but never stop to take the time for ourselves.\n\nFor example, you wouldn’t hesitate to stay 20 minutes late after work to meet a deadline. You would be happy to take a 20-minute coffee break for a friend in need. But you continue to make excuses as to why you can’t take just 20 minutes a day for yourself. But if you don’t, all those whom you take care of now, might soon be taking care of you.\n\nIf you haven’t been able to settle in to a regular workout routine because you simply don’t have the TIME – guess what? Twenty minutes is less than 2% of your day, but still plenty of time for a workout.\n\nBut you might be thinking, “that’s not enough time to get a good workout in”. Don’t worry – we have just the solution for you.\n\nThe PowerWave™ was created to provide all fitness levels with a comprehensive and adaptable training device that can be used ANYWHERE!\n\n • Reduce body fat and tone up\n • Increase cardio and muscular endurance\n • Increase muscle strength and size\n\nWhat makes the PowerWave™ so unique?\n\n 1. Keystone – Serves as the pivotal point of the PowerWave™ and provides the structural balance to facilitate proper posture and alignment during exercises. The majority of the weight of the PowerWave™ resides here, providing increased resistance and a greater level of centripetal force experienced during circular and swinging motions.\n 2. Handles – Located on the spine of the PowerWave™, with anti-rip construction, the durable reinforced handles add thousands of possibilities for new and challenging exercises.\n 3. Straps – Heavy-duty, triple wave straps that withstand the G-force you create with the momentum of the PowerWave™.\n 4. Thermo-Gel Pad – Temperature responsive gel pad shielded by perforated leather and helps maintain the catabolic rate of energy release for an increased calorie burn.\n 5. Grip Tracks – Removable padded straps with thermo-gel allow for multiple grip positions that comfortably support the wrist.\n\nTwenty minutes a day with a PowerWave™ is all it takes to achieve health benefits and reach your fitness goals all while you maximize your workout time.\n\nSo, when will you join the revolution?", "pred_label": "__label__1", "pred_score_pos": 0.5620377063751221} {"content": "Log In\n\nBuilding Without Ego is Product Management\n\nElizabeth Zalman, co-founder and CEO of strongDM, shares key leadership, fundraising, and go-to-market strategies for entrepreneurs, including how to navigate the challenge of starting over in the search for product-market fit.\n\nFive years ago, Elizabeth co-founded strongDM, a product that heads of IT, infrastructure and dev ops teams use to manage, audit, and secure database access.\n\nThe current strongDM product, which Elizabeth refers to as ‘strongDM 2.0,’ looks a lot different now than it did in 2015.\n\n“Our initial hypothesis was that companies were ingesting greater and greater amounts of data. Data that analysts tend to use is stored in databases with rows and columns. There’s a data definition language. So we thought, why can't you write a bunch of assertions on top of the data? And so we built that product and we got maybe 10 POCs up, and then nobody would pay money for it, not a single dollar,” Elizabeth says. “And the reason for that was there was no owner of data quality in an organization. There was no buyer. And without a buyer, you don't have a budget.”\n\nAfter a year of building and pitching a data quality product, the strongDM threw out the initial product in favor of its current iteration. “We went back to the drawing board. And we realized there was a massive opportunity with respect to access,” she says, citing the opportunities that cloud computing and the growing popularity of remote work provided.\n\nFinding product-market fit is a company’s only job in the early stages, and while starting over is challenging and incredibly daunting, the rewards outweigh the risks. “I think you shouldn't be afraid to throw everything out, and that's incredibly scary. Your job as a founder is to figure out something that you can sell in order to win and to win big,” says Elizabeth.\n\nNow, much of Elizabeth’s time is dedicated to managing strongDM’s current growth cycle, which demands a lot of hiring for an entirely remote workforce, as well as constant product discovery and adapting to customer feedback.\n\n“I think everybody will say to you they put customers first. We really do it strong,” she says. “You have to meet your customer where they are, which means you have to honor and respect where they are and you need to be patient. Use the language that they use. You move at the pace that they want to move. How do you build a product that seamlessly addresses the functionality of somebody who's crazy cutting-edge in terms of how they want to deploy, with somebody who hasn’t upgraded their Windows servers since 2008? The product has to work the same for both of those people.”\n\nIn this episode, you’ll learn a lot about product-market fit, fundraising, and managing remote teams.\n\nHere are the highlights: \n\n • How to hire and manage entirely distributed teams (8:40)\n • StrongDM’s approach to finding product-market fit (10:44)\n • Elizabeth’s advice for companies or entrepreneurs who need to pivot their product offering (13:44)\n • Strategies for approaching the fundraising process (14:55)\n • Why good product discovery and development starts with listening to your customers (17:30)\n\nSubscribe to the This Is Product Management", "pred_label": "__label__1", "pred_score_pos": 0.6166548728942871} {"content": "Principal Environmental Consultant\n\nLast updated 12 days ago\nLocation:Brighton and Hove\nJob Type:Contract/Temp\n\n\nMott MacDonald's Energy Environment and Social team is at the leading edge of delivering environmental services for energy projects internationally. Our team is looking for a Principal or Technical Director level environmental consultant to join our team. This position will initially be on a 12 month fixed term contract.\n\nThe focus of the role will be on environmental assessments for energy projects, particularly in Europe, Africa and Latin America. We work on some of the most significant generation projects in the world, including solar, hydro, wind, and thermal generation technologies.\n\nKey elements of the role will include:\n* Environmental due diligence\n* Environmental monitoring and management\n* Environmental impact assessment\n* Guiding junior team members and technically assuring their work\n* Managing projects as well as clients and sub-consultants\n* Preparing proposals\n* International travel\n\nYou'd be part of a truly multidisciplinary team; working alongside some of the best environmental specialists, social specialists and engineers in the industry.\n\nCandidate specification:\n* Extensive demonstratable experience\n* Fluent in English\n* Degree and Masters qualified in an environmental subject\n* Membership of a relevant professional institute\n* Experienced in the coordination and delivery of environmental work by multi-disciplinary teams including due diligence and ESIA for major infrastructure energy projects\n* Thorough understanding and experience of applying environmental safeguards of international finance institutions such as the World Bank Group, the European Bank for Reconstruction and Development and European Investment Bank, among others;\n* Able to review complex documents, summaries and present the key issues in a clear and concise way\n* Ability to travel\n* Strong interpersonal, communication and writing skills\n* Experience of providing technical leadership\n* Aptitude in identification, progression, delivery and success in tendering for new project opportunities\n* Able to work within a team and motivate others to deliver to high standards\n* Able to meet challenging budgets and timescales\n\n\n* Fluent in French or Spanish\n* Experience of managing or delivering environmental work for UK DCO applications\n* A competent standard in an environmental specialism and a broader awareness of other environmental or social discipline\n* Experience of options appraisals and iterative design processes\n* Understanding of the technical aspects of major infrastructure projects (such as energy generation technologies)", "pred_label": "__label__1", "pred_score_pos": 0.6178834438323975} {"content": "St Day Churchyard\n\nSt Day was a place of pilgrimage prior to the Reformation when there was a chapel dedicated to the Holy Trinity, situated in the area occupied by Trinity House at West End and the adjacent Trevean Cottages in Buckingham Place.\n\nSt Day was the commercial centre of the Gwennap Mining Area and with Carharrack and Lanner was part of the Gwennap Ecclesiastical Parish until 1835 when St Day became a separate parish.\n\nPrior to the dedication in 1828 of the now closed Old Church burials took place at Gwennap. Worship now takes place in the converted Sunday School on the opposite side of the road.\n\nIn the Old Church there are extensive interpretive boards which give an insight into the history of the area. There are also memorials on the walls and an impressive memorial statue. The Old Church is open through the summer months.\n\nThe tops of the iron railings at the entrance to the Churchyard and the railings around most graves were removed to aid production of munitions in World War II.\n\nThe decline of mining after 1850 led to the widespread emigration to various parts of the world and several headstones record the death of a loved one abroad.\n\nThere are several graves of servicemen killed in the two wars. One of these is unusual in that it commemorates two soldiers.\n\nDown the right of the Old Church are the large flat topped tombs of the Harvey family who were merchants supplying the mines of the area as well as the general public.\n\nTo the east of the church enclosed by railings is the tomb of the Hawke family who owned a rope works at Tregunlow.\n\nTo the north of the church is the large grave of the Corfield family who ran a chemists shop in Church Street for several generations. Their descendants are buried just in front of the Hawke family’s tomb.\n\nBelow is a plan of St Day Cemetery. The numbers allow you to pictorially wander around the churchyard on the Gallery below, starting by the main gate and going clockwise through the cemetery. On Google maps here:\n\nThe Gallery follows the above plan sections.", "pred_label": "__label__1", "pred_score_pos": 0.6815471649169922} {"content": "Why Being Left-Handed is an Advantage in Tennis?\n\nJoão Mourato\n\nMonday, March 18, 2019 12:14 PM UTC\n\nMonday, Mar. 18, 2019 12:14 PM UTC\n\nBeing a left-handed player has certain advantages in tennis. On this article we’ll take a look at some of the reasons why lefties have been so successful over the years.\n\n

Left-handed players have several advantages which makes them very dangerous opponents on any surface. Lefties will always bring different challenges than usual and that’s what makes some so dangerous. On the other hand, the right-handed player will not present anything out of the ordinary for the left-handed. Besides this, there are also some aspects of the score system that benefit left-handed players. Let’s take a look at them:

Different Patterns

According to the United States Tennis Association, only 10 percent of the players in the world are left-handed. This means that, in theory, a right-handed will play only 10% of the times against left-handed players, while, on the other hand, left-handed players will face right-handed opponents nine out of ten times they play.

Due to the significant difference in the number of right-handed and left-handed players on the tour, it’s obvious that all players are more used to face right-handed opponents. Whether it’s on practice or in a match, players are constantly playing against right-handed and adjust to their style of play. Lefties have very different patterns and bring a unique style of play, which makes it so hard for players to adjust to them. However, not only right-handed players struggle when facing lefties. Left-handed players also have a hard time when facing a fellow lefty since both bring very different patterns to the game.


How Can Weather Conditions Influence Your Tennis Tips?

Score System

Before we get into details regarding the score system and why left-handed players have an advantage, it’s important to explain the difference between ‘Deuce Side’ and ‘Ad Side’. Players can serve from two different positions, the right side of the court is known as ‘Deuce Side’ while the left side of the court is the ‘Ad Side’. For that reason, right-handed players can open the court much easily from the ‘Deuce Side’ while left-handed players are much more dangerous when serving from the ‘Ad Side’.

There are four possible situations where a player can close out a game: 40-0; 40-15; 40-30; A-40. Of course, the same logic applies to the four possible opportunities for a player to break the opponent’s serve: 0-40; 15-40; 30-40; 40-A. From these eight scenarios, in six of them the server will start the point from the Ad side while only in 25% of the situations will start from the Deuce side:

  • Deuce Side: 40-15; 15-40;
  • Ad Side: 40-0; 40-30; A-40; 0-40; 30-40; 40-A

As mentioned above, left-handed players can open the court easily from the Ad side and have the advantage when serving from that side. Which means that, in 75% of the possible situations to close a game, the left-handed players will have the advantage of serving on their favourite side. This is a huge advantage for lefties, who will have the opportunity to serve on pressure points from their favourite side of the court, while right-handed players will have a much harder task.

Conclusion

Fading left-handed players is always dangerous since they have some theoretical advantages before the match begins. Lefties have been incredibly successful in tennis throughout the years with Rafael Nadal, John McEnroe, Rod Laver and Jimmy Connors as the best left-handed players in the history of the game.

As indicated before, only around 10% of the players in the world are left-handed. However, currently there are 17 lefties in the Top 100 on the ATP Tour, which is 70% more than the standard ratio of left-handed players. For that reason, before placing any bet in a match involving a lefty, always analyse the opponent’s performance against left-handed players because that can be the difference between winning and losing your bet.

\ncomment here", "pred_label": "__label__1", "pred_score_pos": 0.8945276737213135} {"content": "David Auerbach on literature, tech, film, etc.\n\nTag: diderot (page 1 of 3)\n\nAbsolutism in the French Enlightenment\n\nThis letter is from the June 8 TLS, in response to a review of Jonathan Israel’s Democratic Enlightenment. It’s a far more substantive review than Darin MacMahon’s silly dismissal, but it makes the ubiquitous mistake of attributing a predominantly absolutist streak to the French Enlightenment.\n\nAs yet another inauspicious attempt to correct this received idea, I post the letter here:\n\nSir, – Jeremy Jennings is not quite correct to say that the philosophes firmly stood behind “one true morality [applying] to all the inhabitants of the globe” (in his review of Jonathan Israel’s Democratic Enlightenment, May 25). While Helvétius, d’Holbach and La Mettrie had significant universalist tendencies, Montesquieu and Diderot did not. Diderot explored cultural pluralism in Supplément au Voyage à Bougainville and the aptly titled Réfutation d’Helvétius, and remained sceptical towards all forms of absolutism, including liberal absolutism. Both Montesquieu and Diderot’s empiricist, anthropological explorations influenced Johann Herder’s similarly pluralistic attitudes in his Spinozist world view. Montesquieu and Diderot were a far greater influence on French Revolutionary figures; Helvétius and d’Holbach’s universalism ironically manifested itself only later in utilitarianism and Marxism.\n\nAs I have argued (TLS, May 6, 2011), there is a strong supporting case for Israel’s division between an early rational revolution and an irrational, fundamentalist revolution of terror during the Jacobin period. Only after the fall of the philosophe-inflected Girondins does one see a burgeoning vision of an irrationalist “one true morality” in Marat, Danton and Robespierre. Robespierre himself was an avowed devotee of Rousseau, and his influence is seen in the striking abandonment of liberty and atheism that the Jacobins pursued, as when he established a Deist Cult of the Supreme Being intended as the new French state religion.\n\nIf there was one absolute to which the philosophes adhered as a whole, it was that of liberté: not an absolute moral value, but a basic human right.\n\n\nAlas, both neo-Jacobins and neo-Burkeans have helped reinforced the misconception that such deep skeptics as Diderot, D’Alembert, and Isabelle de Charrière were foaming-at-the-mouth imperialist Panglossians.\n\nI advocate this heuristic: the more a philosopher bemoans the absolutism of some past ideology or movement, the more likely that philosopher is an absolutist.\n\nDiderot’s Philosophy of Mind: Vitalist or Emergentist?\n\n\n\n\n\n\n\n\nLester Crocker thinks Diderot never figured it out:\n\n\nLester Crocker, Diderot’s Chaotic Order\n\n\n\n\n\n\n\nD’Alembert’s Dream\n\n\n\nDenis Diderot in the TLS\n\n\nThis excerpt covers some of Diderot’s very diverse influence on subsequent thinkers and writers:\n\nMoi and Lui and a Beehive\n\nDenis Diderot OEUVRES PHILOSOPHIQUES Edited by Michel Delon and Barbara de Negroni 1,413pp. Gallimard. €65.\n\nPhilipp Blom WICKED COMPANY Freethinkers and friendship in pre-Revolutionary Paris 384pp. Weidenfeld and Nicolson. £25.\n\nIn 1805, over twenty years after the death of the French philosophe Denis Diderot, Goethe read a manuscript of Diderot’s then-unpublished dialogue Le Neveu de Rameau. Captivated, he translated it into German. After reading the translation, Hegel cited Diderot along with only half a dozen other modern philosophers in the Phenomenology of Spirit, alongside Descartes and Kant.\n\nSince then, Diderot has wielded diverse influence across the humanities and sciences. Sigmund Freud credited a passage in Le Neveu de Rameau with anticipating the Oedipus complex, while Simone de Beauvoir singled Diderot out as having championed the cause of women. Karl Marx, who like Diderot also wrote a homage to Laurence Sterne’s Tristram Shandy, counted Diderot as his favourite writer. Auguste Comte called him the greatest philosopher of the eighteenth century, and a key forerunner of positivism. The pioneering cultural pluralist Johann Herder drew from Diderot’s observations on cultures and language.\n\nYet well into the twentieth century, Diderot’s intellectual reputation remained comparatively submerged, even in France. He was the least systematic of writers, and his works were published in the least systematic of ways. His modest publication history during his lifetime paled next to the monumental achievement of editing the Encyclopédie, which occupied him for twenty years. Unlike Jean-Jacques Rousseau and Étienne Bonnot de Condillac, he never published a chef-d’oeuvre. His most sophisticated and radical works were published only posthumously, and their interdisciplinary and non-systematic nature prevented their easy assimilation into the literary or philosophical traditions. His first collected works were not published until 1870. The new Pléiade edition of four volumes, of which the volume under review is the second, is a welcome corrective measure, capturing and contextualizing his unique, eclectic voice and aggressive speculation. Today, Diderot seems more contemporary than his more famous brethren, Voltaire and Rousseau.\n\nDiderot, 25 Years On\n\n\n\n\n\n\n\nDenis Diderot’s Pensées Philosophiques\n\nThe Pensées Philosophiques were an early work of Diderot’s written around 1747. They were popular but also got him into trouble by critiquing religious belief and Catholicism. A few years later he would be an outright atheist. They are more aphoristic than usual; he was never given to great exegesis, but he tended to avoid the overly polemical statement as well. Chalk it up to youth. The translation here is from 1916, by Margaret Jourdain, and is a bit antiquated. I’m not aware of a newer one.\n\nPeople are for ever declaiming against the passions; they attribute to them all the pains that man endures, and forget that they are also the source of all his pleasures. It is an ingredient in man’s constitution which cannot sufficiently be blessed and banned. It is considered as an affront to reason if one ventures to say a word in favour of its rivals; yet it is passions alone, and strong passions, that can elevate the soul to great things. Without them, there is no sublime, either in morality or in achievement; the fine arts return to puerility, and virtue becomes a pettifogging thing.\n\nIt is not from the metaphysician that atheism has received its most vital attack. The sublime meditations of Malebranche and Descartes were less calculated to shake materialism than a single observation of Malpighi’s. If this dangerous hypothesis is tottering at the present day, it is to experimental physics that the result is due. It is only in the works of Newton, of Muschenbroek, of Hartzoeker, and of Nieuwentit, that satisfactory proofs have been found of the existence of a reign of sovereign intelligence. Thanks to the works of these great men, the world is no longer a God; it is a machine with its wheels, its cords, its pulleys, its springs, and its weights.\n\nYou grant me that matter exists from all eternity and that movement is essential to it. In return for this concession, I will suppose, as you do, that the world has no limits, that the multitude of atoms is infinite, and that this order which causes you astonishment nowhere contradicts itself. Well, from these mutual admissions there follows nothing else unless it be that the possibility of fortuitously creating the universe is very small but that the quantity of throws is infinite; that is to say, that the difficulty of the result is more than sufficiently compensated by the multitude of throws. Therefore, if anything ought to be repugnant to reason, it is the supposition that –matter being in motion from all eternity, and there being perhaps in the infinite number of possible combinations an infinite number of admirable arrangements,–none of these admirable arrangements would have ensued, out of the infinite multitude of those which matter took on successively. Therefore the mind ought to be more astonished at the hypothetical duration of chaos than at the actual birth of the universe.\n\nAnd a note on style, from “Letter on the Deaf-Mutes”:\n\nThe poet and the orator gain by studying harmony of style, and the musician finds his compositions are improved by avoiding certain chords and certain intervals, and I praise their efforts; but at the same time I blame that affected refinement which banishes from our language a number of vigorous expressions. The Greeks and Romans were strangers to this false refinement, and said what they liked in their own language, and said it as they liked. By overrefining we have impoverished our language; and though there may be only one term which expresses an idea, we prefer rather to weaken the idea than to express it by some vulgar word or expression. How many words are thus lost to our great imaginative writers, words which we find with pleasure in the pages of Amyot and Montaigne! They were at first rejected from a refined style, because they were commonly used by the people; later on they were rejected by the common people, who always ape their betters, and they are become entirely obsolete. I believe we shall soon become like the Chinese, and have a different written and spoken language.\n\n« Older posts\n\n© 2021 Waggish\n\nTheme by Anders NorenUp ↑", "pred_label": "__label__1", "pred_score_pos": 0.6822676658630371} {"content": "What is the Difference Between Project and Portfolio Management?\n\nPM, PPM, PgM. What is the difference between portfolio management and project management, exactly? And where does program management fit in? Here's a quick explanation of each in plain English to help you distinguish the differences.\n\nWhat is Portfolio Management?\n\nA portfolio is a high-level view of all the projects an organization is running in order to meet the business's main strategic objectives. It could be every project across the entire company, a division, or a department.\n\nPortfolio management involves setting priorities based on the business leadership’s agreed-on objectives, and then choosing programs and projects to undertake based on what will provide optimal business value, the level of risk involved, and available resources. According to project manager Bob Buttrick, while project management is about executing projects right, portfolio management is about executing the right projects.\n\nProject portfolio managers look at a company’s projects and evaluate whether they're are being executed well, how they could be improved, and whether the organization is experiencing the expected benefits.\n\nWhat is Program Management?\n\nA program is a group of related projects that all contribute to the same business objective or benefit. The program as a whole has a clear, defined goal, and each project within the program assists in meeting those goals.\n\n\n\nOrganizations manage projects as a larger program because doing so gives you greater control and benefits than you may see by managing them separately. It’s also easier to coordinate and prioritize resources across projects, and oversee progress and outcomes when you look at a group of related projects.\n\nWhat is Project Management?\n\nWhile portfolios and programs focus on a higher-level view of an organization's activities, a project is a single undertaking: a series of tasks that aims to produce a specific product, service, or benefit within a defined timeline.\n\nProject managers oversee individual projects, leading teams and making sure projects are completed on time, within budget, and meet the established requirements. They determine best practices, examine processes to improve efficiency, and work with stakeholders to make sure expected benefits are realized, among other responsibilities.\n\n\nLearn More About Project Management\n\nIf you're a new project manager and still struggling to comprehend the vocabulary as well as the processes, then we've prepared a resource that you will find useful. It's called The Project Management Guide for Beginners, and it's online and totally free to browse. Bookmark it for easy reference.\n\nWhat is the Difference Between Project and Portfolio Management?\n\nSources: PMfiles.com, Wikipedia.org, ProjectSmart.co.uk\n\nComments 0\n\n\nFind out more", "pred_label": "__label__1", "pred_score_pos": 0.8753612637519836} {"content": "Zanaflex Lethal Dose\n\n- zanaflex where to buy | zanaflex street price | can zanaflex make you high\n\nChristianity Today, while mostly giving the album positive remarks, Zithromax Pneumonia Treatment felt that the ballads were a bit too pop-oriented compared zanaflex lethal dose to the heavier songs. About Strattera Zoloft 8000 zanaflex class of zanaflex muscle relaxer those who received bad blood have died or are expected to die as a result. Adams, Susan Getzendanner, George C.\n\n- zanaflex and zyrtec | zanaflex class\n\nLater, he copied and arranged zanaflex time to kick in music for performance or as zanaflex 2mg side effects study material for his pupils. This shakeup, coupled with Corgan going through a divorce Information On Effexor and the death of his Furosemide Interactions mother, influenced the somber mood of the band's next album, 1998's Adore. zanaflex lethal dose\n\nzanaflex class\n\nNalbuphine did not zanaflex muscle relaxer produce either a wheal or flare response. Romantic styles in literature and painting of the era. Mysterious Tarot zanaflex class Valtrex Asymptomatic Shedding cards zanaflex lethal dose are placed in the guests' bedrooms, which gives Gilda even more reason to believe that there are hauntings in Oxford. Matthew Casey and Gabriela Dawson's Keflex And Yeast Infections wedding.\nBob and Abishola inadvertently have their first kiss. Tuesday and Saturday of every zanaflex lethal dose week are particularly popular days at Hanuman temples. He also worked on advancing a framework for the zanaflex uptodate creation of a generic drug user fee program, final implementation of the physician labelling and pregnancy labelling rules, and pandemic preparedness. Upon return, the band split up and Atenolol Abuse Matt started over with zanaflex time to kick in a new group of musicians.\n\nzanaflex muscle relaxer\n\nPiper missed most of the 2003-04 and 2004-05 seasons due to injury and rehabilitation. July 2017, after zanaflex 4 mg which the codebase was put into zanaflex time to kick in maintenance mode. George Frideric Handel included them in many of What Is Prednisolone Sodium Phosphate Used For his oratorios. Honokiol is zanaflex lethal dose most commonly taken orally.\n\nzanaflex muscle relaxer\n\nA study published in 2004 showed that in one case, a needle biopsy of a liver tumor resulted in the spread of the cancer along the path of the needle and concluded that needle aspiration was dangerous zanaflex lethal dose and unnecessary. The main enemy of the game is a sadistic but zanaflex lethal dose zanaflex for headaches intelligent arms-dealer known as the Jackal, whose guns are fueling the violence in the country. Clozapine is a zanaflex class dibenzodiazepine that is structurally related Does Glucophage Cause Diarrhea to loxapine.\n\nZanaflex Lethal Dose - zanaflex 2mg side effects | Buying Prescription Drugs\n\nDuring the airing of the nineteenth episode of Man from the Equator, screens countrywide went black for 10 minutes. Ash Tadalis Sx 20mg Kaufen warns Lily about her behaviour Soma fast delivery when she performs a life-threatening operation on a patient in cubicles. Both disciplines are distinct. Musk's proposal, if technologically feasible at the costs he has cited, would make Hyperloop smoking zanaflex travel zanaflex lethal dose cheaper than any other mode zanaflex lethal dose of transport for such long distances. Philadelphia, and San Antonio. zanaflex and zyrtec\nSimilar Pages: Propranolol Mecanismo De Accion Cymbalta Vs Prozac Doxycycline Facts Zithromax Z-pac\n\nDeixe uma resposta\n", "pred_label": "__label__1", "pred_score_pos": 0.9300054311752319} {"content": "Don’t let your personal prejudices get in the way of creating content: Blok and Dino\n\nBy Naveed Rozais\n\nThe Sri Lanka Development Journalist Forum (SDJF) recently held the fourth edition of their Media 4 Everyone series titled “Gender-sensitive media content, SO WHAT?”, speaking with award-winning content creators Blok and Dino, on gender-sensitive media content and its importance. The discussion was moderated by gender and women’s rights consultant Sharanya Sekaram. The SDJF has been working towards achieving gender equality for over 10 years, driving many initiatives to come closer to achieve this goal.\n\nBlok and Dino is an award-winning duo of content creators, Gehan Blok and Dino Corera, who have a combined 20 years of experience in the fields of journalism, broadcast, and media.\n\nThe pair spoke about their content creation process, sharing that they actively work to break stereotypes with lots of subtle, subliminal messaging that goes into the language that they use as well as in the characters they build, addressing tropes like minor staff being immediately wrongfully accused when something goes missing or the elderly being portrayed as vulnerable and dependent, and showing that this isn’t always the case.\n\nBlok and Dino also spoke about breaking brand stereotypes and fighting misinformation about brands and the social and ethnic groups that they’re related to, explaining that they do not consider things like race, religion, or social class when approached to work with brands. Blok and Dino cited the example of Pick Me, which is perceived to be a Muslim brand, saying that when working on their Pick Me content, they decided to create something so funny that even the most racist person would be amused and consume the content repeatedly.\n\nBlok and Dino sometimes draws criticism because Corera and Blok frequently portray female characters themselves, which can be seen as insensitive and reinforcing negative gender stereotypes, but Blok shared that this is simply because their brand is “Blok and Dino”, and their audience expects to see them in their content, and when the pair do portray female characters, it is only main characters that they portray themselves. Blok also commented that when creating such characters, focus is always given to the character and Blok and Dino actively avoid running down the women they portray unless the situation is very specific, like in their sketch the “The Tanhadasas”, which saw both main characters being evil but in completely different ways when angling for the better share of their mother’s estate.\n\nBlok and Dino shared that the content culture in Sri Lanka tends to run down women with creators tending to resort to rude stereotypes for laughs, shares, and views. This is also what brands tend to look for when looking for brand conversion. This is something Blok and Dino doesn’t compromise on, insisting on creative freedom. “We don’t do ads, what we do is content marketing. It takes some convincing to make brands understand it’s not an ad but a story that connects organically with the brand, talking about its USPs (unique selling points) and brand values in the course of the storyline. It’s like a trojan horse that gets the message across to the customers.”\n\nBlok and Dino also shared that they have the luxury of being able to decline to work with brands when values don’t align and brands aren’t able to step away from the traditional approach.\n\nSpeaking on media and gender sensitivity, and sharing views on why sensitivity is an issue, Blok and Dino shared that a major problem is that most creatives in mainstream media are underpaid, and as a result, end up moving on to better opportunities, and the talent that remains is not always the best. Blok shared: “If you want to retain quality talent, you have to pay them properly. That’s the absolute truth.”\n\nAnother issue that affects sensitivity in media is the fact that most, if not all, media companies have some sort of political alliance or affiliation and are biased towards one party or another, and even if creators try their best to create sensitive content, it’s hard because the powers that be are affiliated to someone. Advertising also comes into play. If an article is written against a company, there is often the threat of advertising being pulled immediately, and advertising revenue is crucial to keeping media businesses going.\n\nRadio also plays a huge role in spreading gender-sensitive messages. Corera shared that especially in morning radio, there is the chance to address deep issues humorously and casually because the audience is more or less captive in their cars on their way to work or school. “Good radio involves a lot of planning, scripting, and chemistry between the hosting personalities as well. You can talk about anything, provided you sugarcoat the bitter pill correctly. Which is what good late-night hosts and comedians do.”\n\nBlok and Dino also spoke about women content creators and comedians, sharing that with Sri Lanka’s present online audience being predominantly male, female comedians will inevitably face added discrimination and hate because of their gender, adding that these are deep-seated cultural issues that need to be fixed over time with thoughtful strategies like education reform as well as responsible reporting. Blok and Dino also pointed out that the audience is maturing which is a good sign, and in a few years, we are likely to see a lot of women content creators coming out.\n\nSharing advice on how to create more sensitive content, Blok and Dino encouraged creators to challenge the norms and usual stereotypes that we see. They encouraged creators to understand there is currently a set way of telling a story that is not sensitive and to change this. To correlate different characters and break the status quo. They also stressed that creators need to take responsibility. Sensationalism is not the only way to get a message across; creators need to be more thoughtful about the messages that they’re putting out there.\n\nPersonal bias is also very important. “Try and be unbiased,” Blok said. “Don’t let your personal prejudices get in the way of creating content. You can’t be affiliated to any party or religious denomination. All of that needs to be left behind. The one thing you need to pay attention to is being a normal human being.”", "pred_label": "__label__1", "pred_score_pos": 0.9163880348205566} {"content": "Quick Answer: What Are The Advantages And Disadvantages Of White Box Testing?\n\nWhat are the advantages of manual testing?\n\nAdvantages of Manual Testing:Manual testing can be done on all kinds of applications.It is preferable for short life cycle products.Newly designed test cases should be executed manually.Application must be tested manually before it is automated.More items…•.\n\nWho does GREY box testing?\n\nGrey box testing is when the tester has a partial understanding of the internal structure in the system under test. Grey box testing is a process for debugging software applications by making an input through the front-end, and verifying the data on the back-end.\n\nWhat is difference between white box and black box testing?\n\nBlack Box testing has the main goal to test the behavior of the software whereas White Box testing has the main goal to test the internal operation of the system. Black Box testing is focused on external or end-user perspective whereas White Box testing is focused on code structure, conditions, paths and branches.\n\nWhich of the following is not white box testing?\n\nAnswer: Requirement testing. Penetration testing: It is used to check the security of the system by inserting wrong code. … Requirement Testing: It is not related to the source code because we verify requirement in this testing.\n\nWhat are the disadvantages of test?\n\nOn the other hand, the test method has disadvantages: they show the final answer, omitting the mind process of the students that led to this solution; the personal abilities and attitudes of every student cannot become evident from the test alone since the test stresses only on certain characteristics.\n\nWhat is the main purpose of testing?\n\nFirst, testing is about verifying that what was specified is what was delivered: it verifies that the product (system) meets the functional, performance, design, and implementation requirements identified in the procurement specifications.\n\nWhat is white box testing give its pros and cons?\n\nWhite-box testing only validates and tests features that are currently there. If a feature is only partially implemented or something is missing, white-box testing will not pick up on this. This is where requirements driven black-box testing is superior. White-box testing has several clear advantages and disadvantages.\n\nWhy do we do black box testing?\n\nBlack box testing is used to test the system against external factors responsible for software failures. This testing approach focuses on the input that goes into the software, and the output that is produced. The testing team does not cover the inside details such as code, server logic, and development method.\n\nWhat is disadvantage of black box testing?\n\nDisadvantages of Black Box Testing Test cases are challenging to design without having clear functional specifications. It is difficult to identify tricky inputs if the test cases are not developed based on specifications. It is difficult to identify all possible inputs in limited testing time.\n\nWhat are the types of white box testing?\n\n7 Different types of white-box testingUnit Testing.Static Analysis.Dynamic Analysis.Statement Coverage.Branch testing Coverage.Mutation Testing.\n\nWhich of the following is an advantage of white box testing?\n\nBenefits of White Box Testing It allows a finding of hidden errors, to find internal errors because it checks and works by internal functionality. It helps to find issues and optimize code to adopt different techniques of White Box Testing to test a developed application or website.\n\nWhat are the advantages of testing?\n\nIntroduction. … Benefit 1: The Testing Effect: Retrieval Aids Later Retention. … Benefit 2: Testing Identifies Gaps in Knowledge. … Benefit 3: Testing Causes Students to Learn More from the Next Study Episode. … Benefit 4: Testing Produces Better Organization of Knowledge.More items…\n\nWhat are the three different methods of testing?\n\n\nWhich of the following is shift left?\n\nShift Left is a practice intended to find and prevent defects early in the software delivery process. The idea is to improve quality by moving tasks to the left as early in the lifecycle as possible. Shift Left testing means testing earlier in the software development process.\n\nWhat are the disadvantages of white box testing?\n\nDisadvantages / Cons of White Box TestingA complex and expensive procedure which requires the adroitness of a seasoned professional, expertise in programming and understanding of internal structure of a code.Updated test script required when the implementation is changing too often.More items…•\n\nWhat is white box testing example?\n\nWhite box testing involves the testing of the software code for the following: Internal security holes. Broken or poorly structured paths in the coding processes. The flow of specific inputs through the code.\n\nWhat are different levels of testing?\n\n\nIs unit testing white box?\n\nTypes of White Box Testing White box testing can take several forms: Unit testing — tests written as part of the application code, which test that each component is working as expected.", "pred_label": "__label__1", "pred_score_pos": 0.9530251622200012} {"content": "Gayatri Mantra\n\ndownload Gayatri Mantra\n\nof 20\n\n • date post\n\n • Category\n\n\n • view\n\n • download\n\n\nEmbed Size (px)\n\n\nGayatri Mantra Gayatri Mantra Gayatri Mantra Gayatri Mantra Gayatri Mantra Gayatri Mantra\n\nTranscript of Gayatri Mantra\n\nCollective Sadhana of writing\n\nOm bhur bhuvah swah tatsaviturvarenyam bhargo devasya dhimahi dhiyo yonah prachodyatMay the Almighty illuminate our intellect and inspire us towards the righteous path(Rig-Veda 3/62/10, Sam-Veda 1462, Yajur-Veda 3/35, 22/9, 30/2, 36/3)\n\nMahashivratri the 2nd March 2011, To Ramnavmi, the 12th April, 2011.\n\nAll World Gayatri Pariwar\n\nPDF Creator - PDF4Free v3.0\n\nHidden Powers of Mantra\n\nOrigin of Universe\n\nVedic affirmation of the eternal omnipresent Omkar\n\nPower of Mantra\n\nThe power of chant of a mantra is purely spiritual in nature. It is a kind of conscious energy that influences body, mind & inner self (attitude) Generates specific vibrations in the subliminal environment & cosmic domains of consciousness\n\nImportance of sonic pattern\n\nSpecific compilation of syllables and sonic patter of a mantra are of crucial importance. The syllables used in a mantra are like coded representation of sonic energy latently stored in it. Enunciation or chanting specific combination of specific syllables in specific order generates specific quanta of energy that could be of manifold higher order than nuclear energy\n\nDo you know ?? Mantras were invented by the rishis the scientists of Shabda Brahm-Nada Brahm- as the coded formulae and subtle sonic devices to generate and use specific effects of the sublime power of Shabda.PDF Creator - PDF4Free v3.0\n\nHidden Powers of Mantra\n\nDual Effects\n\nJap of a mantra instantaneously generates dual effects one in inner world and other in external Fire burns whatever is inside it and heats up the fireplace and its surrounding area. Similarly, continuous chanting of a mantra not only titillates specific extrasensory energy centers, nerve bundles and ganglions inside chanters body but also generates specific vibrations in the surrounding space that spreads in all directions and influences the subtle environment and other conscious beings too\n\nSubtle Vs. Gross\n\nThe power of sublimated/subtle elements is always enormous as compared to that of gross. Power of steam (subtle) is far more than water or ice (gross). Then what to say about sublime powers of supreme energy of Shabda. This is what make the mantras so unique and endowed with infinite power to vibrate and transmute the spiritual as well as physical realms of life.\n\nPDF Creator - PDF4Free v3.0\n\nHidden Powers of Mantra\n\nCyclic motion\n\nAs verified in scientific labs, continuous cyclic motion produces enormous power. By resonance, sound produced by march of a troop can even break a bridge. Similarly, The energy generated by chanting of mantra in a specific rhythm at constant amplitude is also quite intense. This conjugated with the impulsive force of focused consciousness and vital energy stimulates the otherwise latent extrasensory hormonal glands and power-nuclei in the body\n\nRate of Progress\n\nThe attainment of supernormal bequests depends on the mental and spiritual makeup of the chanter and his engrossment in disciplined mode of chanting. For ex., a radio catches only those frequencies for which it is tuned. The continuity & quality of reception would correspond to unperturbed linkage & sensitivity & perfection of internal components\n\nPDF Creator - PDF4Free v3.0\n\nWhy Chant ? How to Chant ?\n\n\nAs body & clothes get clean after rubbing with soap. Similarly, chanting is the process of cleansing /refining our inner self/attitude. To awaken hidden divinity within and inculcate divine virtues by simultaneously meditating over them\n\n4 stages\n\nRepetition Retention Recall Recognition (to put into practice & change ones lifestyle\n\nTransformation of Ego\n\nThe chanter while chanting any mantra should meditate upon the meaning of the mantra and believe that divine qualities are being kindled within him and he should try to bring a transformation in his lifestyle by believing that he is not an ordinary soul and there is no room for any undesirability within him.\n\nPDF Creator - PDF4Free v3.0\n\nHow to Chant ?\n\nNot just bead rotation\n\nThe process of chanting should not be only limited to just bead rotation and mechanical chanting. To reap full and real benefits of chanting, meditation is a very important aspect which is generally ignored by chanters who just worry about finishing a fixed number of rounds of bead. Mechanical chanting although will yield results of its own but those are insignificant as compared to chanting with correct mindset.\n\nPDF Creator - PDF4Free v3.0\n\n\nSupreme of all Mantras\n\nThis eternal mantra is said to be the genesis of the Vedas. The seers, spiritual saints and scholars of all ages affirm the divine preeminence of this mantra.\n\nUnique composition\n\nIt has remarkable configuration of 24 syllables (carriers of Sabda Sakti) Unique pattern of sublime currents of spiritual force which is derived from the deeper science of Sabda brahm Naad brahm\n\nSpiritual aspects\n\nEnables the chanter to reduce/ remove the effects of past karmas (deeds) Chanter develops a divine ego which enables him to remove the undesirability which have rooted themselves deep into the unconscious mind over a period of many births .\n\nPDF Creator - PDF4Free v3.0\n\nWhy Gayatri Mantra ?\n\nScientific aspects\n\nUnperturbed enunciation of this mantra for a continuous stretch of time would also generate powerful currents that could induce divine effects by vibrating all subtle glands, ganglions, nerve bundles, neuronal passages and extrasensory energy centers in the physical, subtle and astral bodies. Scientific experiments reveal that chanting of Gayatri Mantra stimulates emission of supernormal brain impulses that generate specific aura around the chanter The sound waves that are created, when Gayatri Mantra is said, is of the shape of a ring. It rises up with great speed, through the medium of ether and goes towards Sun, and after touching the surface of the Sun, it returns back along with the powers of Sun, like Heat, Light, electrical and other powers which are very subtle. Thus the Mantra combined with all the powers of the Sun re-enters the subtle body of the Practicer. The stronger the will-power and emotion attached with the Mantra, the Stronger is the attraction of these powers of the Sun. If the Mantra is said with the full concentartion of Mind, it can make impossible, possible. *\n\nPDF Creator - PDF4Free v3.0\n\nWhy Gayatri Mantra ?\n\n\nTheosophist scholar Mr. Leadveater attributes distinctive significance to the collective chanting of Gayatri Mantra in his book Man- Visible, Invisible . The sonic waves along with the sublime currents of Sabd sakti produced by the chanting of the mantra propagate upwards in a spiral shape and expand up to the heart of Sun (the deity of Gayatri Mantra). The echo of these is reflected back and bestows the supernatural energy and flow of prana and divine brilliance of Sun on the body, mind and inner self of the chanter. Arthur Koestler, a renowned thinker, philosopher in an interview to Blitz magazine said commenting on the nuclear war The great Gayatri Mantra is more powerful than thousands of atom bombs. If all of India collectively chants this mantra, the power aroused thereby would annul all hazards of nuclear warfare and protect the globe.\n\n\nPDF Creator - PDF4Free v3.0\n\nIndividual Vs Collective Effort\n\nImportance of United efforts\n\nUnited efforts bear unique importance. Tiny tips of dry grass knitted together form a strong rope Sunrays are bearable when spread on earths surface; when focused together at a point via convex lens, they kindle fire instantaneously Gathering a group of wickers makes a broom\n\n1+1 = 11\n\nPower of collective endeavors is far more significant in the fields of consciousness and spirituality. Grouping of inert object with another gives two objects whereas join venture of two active, talented persons may work like that of 1+1=11 or even more Enthusiasm & joy generated by combined faith of pilgrims is truly remarkable. Organized move of larger congregation of people of compatible ideologies motivated for a common aim creates intense ambience of greater influence\n\nPDF Creator - PDF4Free v3.0\n\nSignificance of Collective Prayer\n\n\nPsychologically, prayer is said to inculcate inducing instructions that gradually invigorate the potentials of mind. Intensity & impact of these inner inscriptions of prayer rise in proportion with the piety and depth of the devotees intrinsic faith. These have reach in the hidden folds of mind and thus are effective in eradication of psychiatric complications, mental weakness, tension, worries, illusions etc. Unity, conjugation and superposition always multiply and magnify compatible effects. Same holds true for collective prayer. Namaj of Mohammedans,", "pred_label": "__label__1", "pred_score_pos": 0.6063975691795349} {"content": "Quick Answer: Where Is The Ark Of The Covenant Today?\n\nWho touch the ark and died?\n\n\nHow was the Ark of the Covenant carried?\n\n\nWhy does the Ark kill everyone?\n\nThe Ark would kill everyone who looked at it because, Biblically speaking, “all [Pope included] have sinned and fall short of the glory of God.”\n\nIs the Ark of the Covenant in heaven?\n\n\nWill the Ark of the Covenant be found?\n\nBiblical home of the Ark of the Covenant is ‘discovered’ in a 3,000-year-old temple in Israel that archaeologists believe was ‘intentionally desecrated’ with animal DUNG by the Philistines. Religious archaeologists in Israel claim they have discovered the stone on which Ark of Covenant once sat.\n\nWho has the Ark of the Covenant?\n\n\nHow much would the Ark of the Covenant be worth today?\n\nIndiana Jones Ark of the Covenant could be worth a face-melting $250K – CNET.\n\nWhat power does the Ark of the Covenant have?\n\nThis object made by Moses at Mount Sinai–part wooden-metal box and part golden statue–had the power to create “lightning” to kill people, and also to fly and lead people through the wilderness.\n\nWhy can’t you look at the Ark of the Covenant?\n\nIf you look at the Ark when it is opened, you die Before translating the writings on the headpiece that give the height of the Staff of Ra, Imam warns Indy not to touch the Ark or look at it when it is opened.\n\nWhen was the last time the Ark of the Covenant seen?\n\n\nWas the ark ever found?\n\n\nWhat happened to the broken tablets of the Ten Commandments?\n\n\nWhere are the original Ten Commandments?\n\nThey have a uniquely terse style. Of all the biblical laws and commandments, the Ten Commandments alone are said to have been “written with the finger of God” (Exodus 31:18). The stone tablets were placed in the Ark of the Covenant (Exodus 25:21, Deuteronomy 10:2,5).", "pred_label": "__label__1", "pred_score_pos": 0.9963404536247253} {"content": "Can technology build an architecture for democratic governance?\n\n\nUsama Khilji, Bolo Bhi\n\n\nShmyla Khan, Digital Rights Foundation\n\nAmel Ghani, Media Matters for Democracy\n\nSalman Zaidi, Program Director Jinnah Institute (JI) \n\nKhushal Khattak, HRCP\n\nJehan Ara, The Nest, P@SHA\n\nTechnology has played a transformative role during the ongoing COVID-19 pandemic. What does the increased reliance on technology globally really mean for democratic governance? How has technology really benefited us with regards to being engaged citizens? Ms. Jehan Ara, while acknowledging the digital divide that exists in Pakistan, stated that technology can play an instrumental in remedying the issues that currently exist in the education, health, and communication sphere. For instance, during the COVID-19 pandemic, there were a lot of Ed-tech start-ups came to the fore and made online learning possible. “These tech start-ups understood that this is a new platform which requires different methods of engagement, something which traditional educational institutions struggled to do.” At the same time, one cannot be oblivious to the fact that limited access is a serious obstacle. Regarding the role technology can play in improving governance, she stated that the government has access to a large volume of data; how that data is used to improve service delivery is ultimately up to the will of the government. She further added that both access to data and its protection is crucial for Pakistani citizens. “We need to strike a balance between access and protection of data, since the data belongs to the citizens and we need to ensure that it is not abused.”\n\nOn the subject of the intersection between technology and media, and how technology can enable the media to improve access to information, Ms. Amel Ghani, stated that there have been positive developments of note during the last few years. For instance, increasingly journalists have been submitting Right to Information (RTI) requests and have been sharing their findings online. Such interventions improve access to information and transparency. Technology has also played an important role with regards to press freedoms allowing journalists to do their job without being curtailed. This is evident as a number of journalists are now reaching out their audiences directly using websites or Youtube channels. “At the same time, there are examples of the government using technology to arbitrarily suppress speech in online spaces, which is unfortunate.”\n\nBuilding on the subject of the regulation of speech in online spaces, the broader issue of human rights and its connection to technology was also raised. Mr. Khushal Khan noted that there are two sides to the issue. “We have witnessed the effective use of social media platforms such as Twitter and Facebook by marginalized groups in the country who otherwise struggle to find a voice in the mainstream media.” However, he added that the government is also attempting to control the narrative on social media, for instance by using PECA against journalists and activists. Ms. Shmyla Khan also chimed in on the issue by arguing that it would be a mistake to view online spaces “as an area of control.” The goal should be to ensure speech instead of controlling it. Furthermore, she opined that there is a need to make PECA more citizen friendly, and that the role of civil society is that of a watchdog. “The state should not view civil society as an obstruction, but as a partner in assisting the government where it lacks capacity at the moment.”\n\nThe participation of women in online spaces and also the quality of their participation was a key issue that was discussed by the panel. Ms. Shmyla Khan explained that when these online spaces were relatively new, there was an assumption that they would be gender neutral. “However, what we have witnessed is that the internet tends to replicate the same structures of oppression. It is connected to our political and social landscape.” She also stated that it is not enough to talk about access to technology without factoring in the social and cultural barriers that exist.\n\nAnother topic that was discussed by the panelists was how large infrastructure projects such as CPEC can impact technology, innovation and development for the youth in Pakistan. Mr. Salman Zaidi stated that Pakistan’s integration in the CPEC project has operated in a very covert space thus far, therefore there is a lack of transparency surrounding the project and what its impact might be going forward. “CPEC is primarily a strategic project for China, and is not intended to benefit the citizens of Pakistan.” He further explained that such large infrastructure projects usually disenfranchise citizens in terms of access and ownership to land, at least initially. Whether it will turn into a game changer for Pakistan, remains to be seen. There was consensus among the panelists that such projects will help with regards to job creation, but maybe not so much when it comes to furthering innovation. Ms. Jehan Ara explained that innovation will be stifled since only Chinese technology is being implemented. “When you have a partner that is much more advanced technologically, there is an imbalance of power in the partnership.” She further added that there are concerns in the Pakistani technology sector about the extent to which it will be able to benefit from these infrastructure projects. However, she concluded on a positive note by pointing out that a number of local companies have been collaborating with Chinese counterparts as part of CPEC, so there is definitely potential for growth and innovation if Pakistan plays its cards right.", "pred_label": "__label__1", "pred_score_pos": 0.995805025100708} {"content": "There will be a Robot Apocalypse within 100 Years: Stephen Hawking\n\nRobots taking over the planet and making humans their slaves’ seems like something out of movies and completely unreal. But according to the popular scientist Stephen Hawking, this “robot apocalypse” is indeed possible. The physicist made this remarks while speaking at the Zeitgeist 2015 Conference held in London on May 12th.\n\nAvengers: Age of Ultron, Terminator, I, Robot are some of the titles that show how the artificial beings are set on taking over the world. Stephen Hawking believes that this is not just fiction and this could become a reality in sometime within the next century. Hawking was quoted saying:\n\n\nThis is not the first time that the famous physicist has spoken his concerns regarding mankind’s future. Back in January, he said that AI could potentially be the end of human race if it goes unchecked. Prominent figures of the tech industry like Elon Musk have also supported his prediction that a “Terminator” like outcome is indeed possible.\n\nMusk went as far as to donate $10 million to keep AI beneficial. The pair have repeatedly called to control artificial intelligence and give it a direction that aligns with the humans aspirations in the future. Their claims are supported by Microsoft Founder Bill Gates as well. You might also be aware of Ray Kurzweil who predicts a similar outcome with his singularity theory.\n\nFacebook, Google and several other big names are working on artificial intelligence. But that is nothing compared to what IBM has in mind for the future. IBM established an AI decades ago that surpasses the current crop of under development AIs. The firm is currently working on improving it to a level that it can take decisions in place of humans and for it to be smart as humans or maybe even smarter than us. Such advancements have raised the concerns of some prominent minds like Stephen Hawking.\n\nIn April, a report from Harvard Law School and the Human Rights Watch called to bind the international powers from developing fully autonomous weapons. Hawking suggested that AI developers could coordinate research between institutions so that AI does not grow beyond human control.\n\nIn April, a report from Harvard Law School and the Human Rights Watch called to bind international powers from developing fully autonomous weapons.\n\nHawking and the others ask that AI should be kept in check so that when it becomes as smart as humans and when it understands that it is smarter, it has interests that are similar to us. He thinks that when AI reaches that far to replace the humans in decision making and becomes a part of our governments and development, we should be able to control it if it is able to be controlled. “Our future is a race between the growing power of technology and the wisdom with which we use it,”Hawking said.\n\nWhat do you think? Is this really a possibility or are these just wild predictions? Let us know in the comments below.\n\nSource: Geek, DailyMail, Newsweek\n\n\n • with so much ongoing advancements every day i think it will take about 50 years not a centuary.\n\n • Kuch bhi nahi hai bhai… Qayamat qareeb hai bas. AI bhi usi ki nishaniyon me se ek hai.\n\n • Yes it surely is possible, I agree with Stephen Hawking. And maybe it will take less than 100 years\n\n • All u need is to put a terrorist group in the mix and you have your very own terminator XD\n\n • I’m with Hawking. As we see advancement in automated robotic technologies some day robots will overcome.\n\n • close", "pred_label": "__label__1", "pred_score_pos": 0.5732064843177795} {"content": "Commenced in January 2007\nFrequency: Monthly\nEdition: International\nPaper Count: 3\n\nhuman security Related Publications\n\n3 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security\n\nAuthors: Anders Troedsson\n\n\nFor us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of \"insecurity.\" An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.\n\nKeywords: human security, timespace, human vulnerabilities, material-immaterial, inert-immediate\n\n2 The Nexus between Migration and Human Security: The Case of Ethiopian Female Migration to Sudan\n\nAuthors: Anwar Hassen Tsega\n\n\n\nKeywords: human security, trafficking, Ethiopia, sudan, labor migration, smuggling\n\n1 Human Security Providers in Fragile State under Asymmetric War Conditions\n\nAuthors: Luna Shamieh\n\n\nVarious players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.\n\nKeywords: human security, Counter Insurgency, Insurgency, asymmetric war, fragile state\n", "pred_label": "__label__1", "pred_score_pos": 0.9944875240325928} {"content": "Cops: Thief swiped bag from car parked at Riverhead school\n\nBARBARAELLEN KOCH FILE PHOTO | Tanger Outlets in Riverhead.\n\nRiverhead police and Suffolk County Crime Stoppers are asking for the public’s help in identifying a man who used a stolen credit card to make purchases at various Riverhead stores.\n\n\nOn Jan. 3, an unknown person broke the window of a car parked at Pulaski Street School and took a purse left on the floor of the car. The victim later told police she learned someone was using the credit cards that were inside her purse.\n\nA man was captured on surveillance footage making purchases with the cards at the LaCoste Store in the Tanger Outlet Center, police said.\n\nThe man was described as white and wearing a green sweatshirt, jeans, and a dark green skullcap.\n", "pred_label": "__label__1", "pred_score_pos": 0.8581067323684692} {"content": "Norwegian history | the post World War 2 era | Norway\n\nLA Dahlmann | talk NORWAY\nKing Olav V of Norway inspecting the cows. Ekeberg, Oslo in 1959. | Photo: Leif Ørnelund - OB.Ø59_1527b - CC BY-SA.\nKing Olav V of Norway inspecting the troops. Ekeberg, Oslo in 1959. | Photo: Leif Ørnelund – Oslo Museum cc by-sa.\n\nThe post World War 2 era | AD 1945 – 1970\n\nA post-war bipartisan spirit and communal energy lifted Norway into a whole new level of activity and development. The labour party – Arbeiderpartiet – governed for 20 of the 25 following years. The labour movement was instrumental in creating the modern-day welfare state that Norway is so renowned for today.\n\nKing Haakon 7 passed away in AD 1957, a hero from both the events in AD 1905, and for his role as a beacon of hope during World War 2. His son, the new King Olav 5, became a flag-bearer of the new era, and a much-respected sovereign. A lot of effort was put into recreating the communities in the northern regions of Troms and Finnmark. The rationing of goods and food lasted for many years. In AD 1949, as a result of the mounting threat of a cold war, Norway became part of NATO and established a close connection to the western powers.\n\nThe post-war mixed economy was a system where the workers, the state, and the capital owners were more equal partners. The industrial activity increased significantly, and more and more people moved from the countryside to the cities. The number of people working in agriculture and commercial fishing went from 42% to 15%. The new era heralded a great shift, where Norway went from being mainly a rural society, to having an urban majority.\n\nDid you see this one?\nNorway | the last workhorse at Sandaker farm\n\nThe emerging welfare state offered child support, sick pay, free public health services, improved social services, unemployment benefits, and much more. Housing quality and the social living standards improved significantly, and schooling was geared up for a prosperous future.\n\nThe discovery of oil outside Norway’s long-stretched coastline in the late 1960s, paired with Norway’s focus on national control over and ownership of its natural resources, gave a massive boost to the Norwegian economy in the decades that followed. Instead of lining the pockets of the rich capital owners, a large portion of the wealth was shared by the entire population.\n\nNext period: Norwegian history | transformation and neoliberalism | Norway\n\nOr see the full: History timeline | from stone age to modern era | Norway\n\nBC = before Christ | AD = anno domini = after Christ\nMain source: Store norske leksikon –\n\nOur most recent posts\n\nMy Norwegian heritage\n\nDo you have trouble sleeping? Here are some examples of how the old Norwegians used Mother Nature’s very own remedies to cure their ailments.\nNorway's mainland coastline, with its many fjords and islands, is the second longest in the world - next only to Canada. Here are some more facts for you.\nWatch some lovely vintage photos of mankinds's many good friends.\nAs far as palaces go, the main royal residence in Oslo is a modestly sized building. Here we see it from an unusual angle, painted by the architect himself.\nWith a growing population and public sector, Norway pushed through significant reforms in several areas: public structure and organisation, welfare, health care, tax, policing, public services, and more.\nSkjemat is a Norwegian noun that means food eaten with a spoon - often before or after the main course at dinner. It could be porridge, soup, dessert, and more.\nWhen the industrial revolution brought machinery to the Norwegian farms, it didn't just change the old working methods, it also changed the layout and look of the farmland.\nLangfjordbotn - in Norway’s northernmost region Finnmark - was the birthplace of Oluf Røde, born in 1889.\nSkibladner is one of the world's oldest paddle steamers still in regular service. She was launched in 1856, and sails on Norway's largest lake, Mjøsa.\nOne of the oldest Norwegian instruments is the birch trumpet. But is it really an instrument at all - or did it originally have a completely different purpose?\n\nFollow us on social media\n\nNorwegian history", "pred_label": "__label__1", "pred_score_pos": 0.9464467167854309} {"content": "Skip Navigation\n\nWhy I’m so concerned about our health?\n\nOur physical health and our mental health are the most important assets that we have. A problem arising in either of them can have significant consequences for all areas of our life, whether it be our relationships, our employment or general enjoyment of life.\n\n\nOur population is both increasing and ageing due to people living longer. This presents us with many challenges including increased demand for our health and care services.\n\nThere is a growth in the numbers of people with one or more Long Term Health Conditions, LTCs. LTCs include things like obesity, type 2 diabetes, high blood pressure, heart and lung disease, and anxiety and depression. All of these have an adverse impact on quality of life.\n\nLevels of obesity are now so high, including in children, that associated conditions, such as diabetes and high blood pressure, are occurring at younger ages.\n\nWhilst some LTCs cannot be predicted, these that I have mentioned are largely preventable. Even if you have one, there are actions you can take to slow any deterioration or even reverse the condition by making appropriate lifestyle choices.\n\nSome statistics:\nLong Term Conditions affect 14% of the population under the age of 40 but the proportion affected rises to 58% over the age of 60 years. Currently 15 million people, around one quarter of the UK population, have at least one Long Term Condition.\nCrucially, 70% of the whole health and care budget is spent on managing and treating people with LTCs.. This leaves just 30% to pay for all the other health and care services we need such as GPs, A&E, maternity, elective surgery and so on.\n\nThe NHS is already experiencing significant funding and staff shortage crises, and is struggling to cope with the existing demand for health and care services. The current situation is unsustainable and we are already seeing rationing of certain services taking place across the country.\n\nThe problem can’t be solved by simply providing more money.\nAdding to this concern, over the period from 2016-2037, the proportion of the population in work, and hence paying income tax, will decrease. In 2016, there were an estimated 308 people of a pensionable age for every 1,000 people of a working age. By 2037, this is projected to increase to 365 people.\nThis increase means that there will be fewer people of working age to support a larger population of older people and this will put increased pressure on services, particularly health and social care.\n\nA different approach\n\nThe Running Granny wants to highlight this serious situation. She also wants to offer a solution that, by adopting healthier lifestyle choices, taking small steps that we introduce over time, we can all help to improve our own quality of life and reduce the likelihood of developing LTCs.\n\nPrevention of the development of LTCs or slowing their decline, if we already have them, will deliver long term benefits both to individuals and to the community at large.\n\nThis is a long term investment in our future health. If we can reduce and reverse the growth in preventable LTCs then, as well as benefiting ourselves, perhaps we can help our NHS to continue to deliver all the services we would like for future generations.\n\nThe Kings Fund – Long Term Conditions and Multi Morbidity; Department of Health – Compendium of Long Term Conditions\nOffice for National Statistics\n", "pred_label": "__label__1", "pred_score_pos": 0.784122884273529} {"content": "THS Junior Wins Award in the Sejong Writing Competition\n\n\nSeren Park, Staff Writer\n\nOn May 30, Brenda Kim (’21) received an honorable mention by the Sejong Cultural Society for her analysis essay on “Cranes.” The Sejong Writing Competition is a competition that encourages children and young adults to learn and write about Korea, thus increasing awareness and understanding of its culture. It not only reconnects younger generations growing up in the United States who are often alienated from their culture to their cultural heritage, but also teaches people from various ethnic backgrounds about Korean culture.\n\nThe essay topic for the senior division, which Brenda participated in, and the adult division was Hwang Sun-won’s story “Cranes.” Sun-won is a prominent writer in Korea for her works of fiction in the 1900s, many of which are focused on the Korean War and its ramifications. Set during the Korean War in a small village along the 38th Parallel, “Cranes” portrays the encounter between Tok-chae, a prisoner who was vice-chairman of the Farmer’s Communist League, and Song-sam, Tok-chae’s childhood friend who is one of the officers escorting Tok-chae from his home to another police station. At first Tok-chae and Songsam peacefully reminisce about their past, but then Song-sam angrily demands why Tok-chae participated in the war and killed people instead of running away. In the end, they come to an understanding that neither could hide from their obligations because of their families, and Song-sam unties Tok-chae’s hands to allow him to escape. Published right after the ceasefire in 1953, the story portrays an optimistic future for a reconciled Korea, in which ideological differences are overcome by friendship. The story is at times criticized for being too naive, since even now, the two Koreas remain hostile toward each other. In their essays, participants had to analyze the text and explain how some aspects indicated the hope for reunification, while others acknowledged the complications surrounding it. \n\nBrenda Kim was already interested in the reunification of Korea, so when she heard about the competition from an acquaintance, she found it interesting to delve deeper into the topic with the story. In her essay, she discussed how the chestnuts symbolized the friendship of the two main characters and how Song-sam’s initial disgust toward his friend demonstrated the hostilities between the two Koreas. She commented, “I definitely felt surprised because I wasn’t really expecting anything, and after reading some of the winning essays I felt my essay was lacking in some parts. However, I’m still honored that my essay was given an award.”", "pred_label": "__label__1", "pred_score_pos": 0.9853291511535645} {"content": "what you have to say...\n\n\nBelow you can read some testimonials of clients of mine both in Holland and the UK.\n\nHello Christina\n\nFor the first time in a long long LONG time I woke up relaxed and NOT WORRYING...worries were not circulating through me like a movie faster than the speed of light. It is so helpful to experience this...what it feels like to not be on a worry treadmill!\n\nThank you for slogging and plodding through the session with me Christina. You really helped me.\n\nI think you have a knack for this EFT work.\nTo me you don't feel judgemental, I experience you as being willing to listen to my input and not IMPOSE a rigid approach, a rigid dogma. And, what I really appreciate is that you don't come across to me as a fanatic promoter of a 'method'.\n\nMeredith Lynn\n\nChristina is a good guide to help you to alleviate your emotional problems and transform more by using EFT. Christina is able to listen with empathy and subsequently helps you to learn and apply the technique in a pleasant way. Highly recommended.\n\nGabriela Drabbe\n\nI recommend Christina as a practitioner, because she is friendly, patient and understanding and encouraged me to work on the topics that matter to me, even when that was hard! She is able to help you deal with painful memories step by step and close the stream of emotions down before you go home; I felt emotionally stable during the time in between the sessions. One can tell that she has a good knowledge of how mental trauma works. I benefitted from her explanation and understanding. The EFT sessions that I have had with Christina enabled me to go on and gain self-esteem; where I was stuck by negative assumptions and stress before. I recommend the EFT technique as it pays so much attention to the physical sensations and helps to release stress and tension that come with the negative assumptions or trauma. Besides, it is a technique that one can learn to use without a practitioner. I benefit from it in my daily life and also in the sessions. I feel I am learning to help myself. I feel in control and independent, where I think in other therapies one often gets (too) dependent on the therapist.\n\nJacobien Wientjes\n\nDear Christina,\n\nI came to you to try and solve some 'knots' regarding my relationship with my family's members; family it's a very delicate and complex issue in almost everyone's life.\n\nFirst of all I thought it would not be easy to share all this with a stranger; but in fact your friendly approach, the sensitivity of your words gave me the clear impression of being understood and deeply supported.\n\nI appreciate your skill in guiding me through my stream of consciousness, helping me to focus and not be stuck in the same circle of endless thoughts.You definitively helped me to focus, not get overwhelmed by my own thoughts.\n\nTapping on those specific points, with your instructions about how to direct my mind while doing this, was a new experience for me. I really felt that during each meeting something was working at a deeper level; I mostly noticed I started having a different understanding of some issues at the base of my relationship issues allowing me to have acceptance of myself facing those issues.\n\nEFT made me realize how much any emotional scar can haunt oneself for lifetime ,driving your choices and judgments, driving your actions by the negative belief rooted in some deep part of our heart; we might regard them as objective facts and forget that these are just personal views.\n\nEFT started a process of  me reconnecting with people and also connecting with myself based on different premises (comprehension is the first). It was a really important achievement, which I am still working towards.\n\nHaving someone who professionally (yet in a very human way) helped me on this path. It was something really  needed. Thank you Christina.\n\n\nAny Questions?\n\nI am looking forward to hearing from you!\n\nAny Questions?\n\nI am looking forward to hearing from you!", "pred_label": "__label__1", "pred_score_pos": 0.7813901901245117} {"content": "How Do I Get Rid Of Little Black Ants In My House?\n\nHow do you get rid of big black ants in your home?\n\nTo get rid of Carpenter Ants, use a combination of Ficam Insect Bait and Fipro Foaming Aerosol indoors around cracks and crevices where they may be hiding.\n\nOutdoors, we recommend applying a barrier perimeter treatment of Reclaim IT Insecticide..\n\nWhy do ants suddenly appear?\n\n\nWill coffee grounds kill ants?\n\nIt’s not just a natural solution, it’s also cheap. Next time you have a cup of coffee, save the grounds rather than throwing them away: Spread used coffee grounds around pet food bowls and other areas where you wish to repel ants. Ants are repulsed by the strong smell the brewed coffee grounds put out.\n\nHow do I get rid of tiny ants in my kitchen?\n\nHere’s how to get rid of tiny ants in the kitchen quickly:Use the dish soap and water method. … Pour boiling water into the sink. … Combine a teaspoon of peppermint essential oil with warm water in a spray bottle. … Create a trap that is 75% peanut butter and 25% powdered borax.\n\nWhat causes little black ants in the house?\n\nLittle black ants typically nest in woodwork or masonry but sometimes come indoors and they are known to nest in the soil and under yard debris. Inside the house, little black ant infestation is usually the result of improper food storage.\n\nWill vinegar kill ants?\n\n\nWhat is the best homemade ant killer?\n\n\nHow do I get rid of ants overnight?\n\n\nHow do you get rid of little black ants?\n", "pred_label": "__label__1", "pred_score_pos": 0.7288193702697754} {"content": "Quick Answer: Are Pine Trees Easy To Cut Down?\n\nAre tall pine trees dangerous?\n\nThe wider, deeper and stronger a tree’s roots, the better it can withstand flooding and wind.\n\nPine-tree roots are not, by nature, shorter or weaker than deciduous tree roots.\n\nIf a pine grove is thinned for house construction, the roots of remaining trees are damaged and can begin to rot..\n\nWhen should a pine tree be cut down?\n\nIf you time the trimming incorrectly, it can hurt the tree’s development. It may also kill your pine trees, which is why timing is everything. Summer and spring trimming or pruning is best since it is the tree’s dormant season. This is the best time of year to trim since it helps to cut down on bark beetle infestation.\n\nWhy are pine trees bad?\n\n\nCan I force my neighbor to trim his tree?\n\n\nHow much is a pine tree worth?\n\nPine timber generally sells for less than ten cents per board foot. So, a big pine tree might be worth $30. However, on a big well-managed plantation, that could add up to significant value on a per-acre basis.\n\nWhat is the average lifespan of a pine tree?\n\nPines are long lived and typically reach ages of 100–1,000 years, some even more. The longest-lived is the Great Basin bristlecone pine, Pinus longaeva. One individual of this species, dubbed “Methuselah”, is one of the world’s oldest living organisms at around 4,600 years old.\n\nHow close can a pine tree be to a house?\n\nabout 15 feetGenerally, trees should sit about 15 feet away from a house. Some large species need a little more room while smaller species can be a bit closer. You can figure out if a tree is too close to a home in two steps.\n\nHow far can a pine tree lean before it falls?\n\nThe trunk, about 2-1/2 feet diameter, comes out of the ground fairly straight up, but beginning about 15-20 feet up starts to bend.\n\nHow do you cut down a pine tree for free?\n\nHow to Remove Trees for FreeCheck to see if your trees are part of a city, state or federal program. … Post ads, either in stores, laundromats or online bulletin boards, advertising free wood for anyone willing to cut it up and haul it away. … Call the power company to remove any unwanted trees that are near power lines. … Cut down the trees yourself.More items…\n\nDo pine tree roots grow down or out?\n\nGenerally pines prefer sandy or silty soils and combinations, e.g., loamy soils. Most pine roots extend down to about 3 feet, but can be deeper in sandy dry soils. The function of the roots is (1) support the above-ground part of the tree and (2) extract water and nutrients from the soil.\n\nDo Pine Trees clean the air?\n\nIt’s a ludicrous strategy, for not only do pine trees – or any other tree species for that matter – not produce ozone, they actually help reduce pollutants such as carbon dioxide and dust, lower ambient air temperature and produce oxygen, says Dr. Eric Taylor, forestry specialist with Texas Cooperative Extension.\n\nAre pine logs worth anything?\n\nYour large pine trees may be valuable to timber-harvesting companies that sell them for lumber….How much is a load of pine logs worth?Species & ProductRecent RangeHardwood Pallet Logs$20.00 to $75.00 per MBFHardwood Mat Logs$225.00 to $300.00 per MBF2 more rows•May 8, 2020\n\nHow much does it cost to cut down a pine tree?\n\nPine Tree Removal Cost Pine tree removal costs $250 to $1,500 or more. As with any species, it’s mostly height dependent. The average price to remove a pine tree is around $400 if the tree is 40 feet tall, but the 80-foot pine trees will cost about $1,500 because of the work and potential danger involved.\n\nDo pine trees fall easily?\n\nPines. Pine trees are particularly susceptible to wind because they are often the tallest trees in the forest. Many pines are fast-growing species that pioneer a site and rapidly rise to dominance. As the overstorey forest layer, pines suffer most from windthrow and have least protection from surrounding trees.\n\nShould you cut the bottom branches off a pine tree?\n\nConiferous evergreens, such as pine trees, do not generally need pruning. Usually only branches near the ground are removed so they don’t touch the earth and possibly transfer diseases to the tree. On occasion pruning is necessary to remove diseased or dead limbs so they do not become a safety hazard.", "pred_label": "__label__1", "pred_score_pos": 0.7120557427406311} {"content": "\n\nCall Today for a Consultation\n\n\nStriving to Protect the people \nyou love, the assets you own,\nand the dreams you hold dear\n\n3 tips on Veteran’s Aid and Attendance pension\n\nThe U.S. Veterans Administration has a program called Veterans Aid and Attendance, or A&A, that provides a pension benefit for qualified military veterans who are housebound or require another person’s assistance for their care. Access to this benefit can be confusing and complicated for those who have never applied before.\n\nThe Veteran’s A&A pension benefit is in addition to the regular VA pension, which is why additional rules apply. If you are a veteran in need of assistance, or if you are a family member of such a veteran, here are three tips to help you better understand this benefit.\n\n1. Know eligibility conditions\n\nThere are several eligibility conditions for the Veteran’s A&A program. While applicants do not have to meet all the conditions, they must meet at least one. One of these requirements is that the person who will receive the benefit must be in need of assistance in performing daily personal care tasks such as bathing, feeding, dressing and the like. Another is that the applicant is bedridden, or in a nursing home. The first step is to determine eligibility.\n\n2. Confirm eligibility requirements\n\nIn addition to meeting one of the conditions stated above, veterans who wish to access the A&A benefit must also meet specific program requirements. These requirements include specifics regarding the length of service during a wartime period, as well as asset and income restrictions. Without meeting the requirements, a veteran may not successfully access the additional pension. \n\n3. Collect documentation and evidence\n\nAs part of the application process, the veteran must provide evidence that demonstrates proof of meeting the conditions and requirements. This can include documents such as a report from the veteran’s physician, as well as financial information. It is important to gather all the necessary evidence prior to submitting an application. Lack of this documentation can lead to a denial.", "pred_label": "__label__1", "pred_score_pos": 0.9865741729736328} {"content": "The statue of a pharaoh found in a Cairo mud pit. It is believed to depict Ramesses II.\n\nHow Did an Enormous Statue of an Egyptian Pharaoh End Up Fragmented in a Mud Pit?\n\n\nA team of archaeologists have unearthed fragments of a gigantic statue, possibly portraying Egyptian pharaoh Ramesses II, in a muddy pit at the ancient Heliopolis archaeological site in Cairo, as Egypt's antiquities ministry announced yesterday. Finds also included a limestone bust of Seti II.\n\nA Pharaoh’s Colossal Statue Found in Pieces  \n\nEgypt’s Minister of Antiquities Khaled El-Enany announced yesterday that a team of Egyptian and German archaeologists uncovered two 19th dynasty royal statues from a muddy pit in a Cairo suburb. Cleft in pieces, the huge quartzite statue was discovered in the densely-populated Ain Shams and Matariya districts, where the ancient city of Heliopolis once flourished. The pieces of the statue were spotted near the temple of the King Ramses II in the temple precinct of ancient Heliopolis, also known as “Oun.”\n\nDietrich Raue, a curator at the Egyptian Museum of the University of Leipzig and head of the German archaeological team that discovered the statue, told Live Science , “We found two big fragments so far, covering the head and the chest. As of yet, we do not have the base and the legs as well as the kilt.\"\n\n\n\nArchaeologists have unearthed fragments of a colossal statue possibly depicting Pharaoh Ramesses II.\n\nArchaeologists have unearthed fragments of a colossal statue possibly depicting Pharaoh Ramesses II. Credit: Dietrich Raue\n\nRaue also added that, according to his early estimations, the statue is about 8 meters (26 ft.) tall. Additionally, Mahmoud Afifi, Head of the Ancient Egyptian Antiquities at the Ministry, told Ahram Online , “Although there are no engravings that could identify such a statue, its existence at the entrance of King Ramses II’ temple suggests that it could belong to him.\"\n\nNearby, the archaeologists also found part of a life-size statue of Pharaoh Seti II. This beautiful bust is about 80 centimeters (nearly 3 ft.) tall and is carved in limestone with detailed facial features.\n\nPharaoh Ramesses II’s Legacy\n\nRamesses II is arguably one of the most influential and remembered pharaohs of ancient Egypt. Ramesses II, the third pharaoh of the 19th Dynasty, ascended the throne of Egypt during his late teens in 1279 BC following the death of his father, Seti I. He is known to have ruled ancient Egypt for a total of 66 years, outliving many of his sons in the process – although he is believed to have fathered more than 100 children. As a result of his long and prosperous reign, Ramesses II was able to undertake numerous military campaigns against neighboring regions, as well as building monuments to the gods, and of course, to himself.\n\nA statue of Pharaoh Ramesses II.\n\nA statue of Pharaoh Ramesses II. Source: BigStockPhoto\n\nThe Discovery of the Colossal Pharaoh Statute is Described as Particularly Significant\n\nAymen Ashmawy, head of the Egyptian team on the mission referred to the discovery as \"very important\" because it highlights how enormous and magnificently constructed the Oun temple was, with authoritative engravings, soaring colossi and obelisks. Unfortunately, as he stated, the temple suffered many damages during the Greco-Roman period, which saw most of its obelisks and colossi being conveyed to Alexandria and Europe. Furthermore, more severe damages took place in the temple during the Islamic era, as many of its blocks were used for the construction of Historic Cairo.\n\nOn a happier note, Raue reassured the media that his team will continue to explore the site in order to find more fragments. \"We have not finished the excavation of the courtyard,\" he told Live Science , and added, \"It is possible we will find the missing fragments, and — who knows — maybe other statues.\"\n\nIf all the fragments are discovered and the immense statue is pieced together, it will be put on display at the entrance of the Grand Egyptian Museum, which is scheduled to open in 2018.\n\nTop Image: The statue of a pharaoh found in a Cairo mud pit. It is believed to depict Ramesses II.  ( Ministry of Antiquities ) Insert: Ramses II, granite - British Museum. (Nina Aldin Thune/ CC BY SA )\n\nBy Theodoros Karasavvas\n\nNext article", "pred_label": "__label__1", "pred_score_pos": 0.9998222589492798} {"content": "“The product of multiplying the passion for reason is called commitment.”\n\nWhat happens when you fall in love with a person, an idea or a project?\n\nYou experience a burst of energy that launches you at high speed\ntowards a certain direction, is not it?\n\nHowever, this burst will end soon and what will keep you in\npath is the reason, plan, strategy and tactics, tasks to accomplish.\n\nThis multiplication of passion for reason is the commitment:\n\nconsistent, persistent, powered by a big bang and a powerful deliberate intention.\n\nAct this way and you will have success in all aspects of life.\n\n\nDeixe uma resposta\n\n", "pred_label": "__label__1", "pred_score_pos": 0.5639144778251648} {"content": "All About:The Blockchain\n\n\nWhile many people understand the basics of Bitcoin’s blockchain, it is important to understand it completely. Many people argue that the blockchain, Bitcoin’s underlying mechanic, has more value than the currency itself. Several different financial institutions have conducted research on digital currencies and have all found that Bitcoin has the chance to turn the global financial industry upside down, all because of the blockchain. The blockchain’s potential is huge, and I will be discussing the future of the blockchain in a separate article. This article, as part of Bitcoinist’s educational resources, is geared towards anyone that already knows a little bit about Bitcoin. Whether you are new or consider yourself an authority on Bitcoin, this article likely has something for you. The ideas in this article will be the building blocks (pun intended) of the future “All About: Blockchain” articles.\n\nAlso Read: Colored Coins, What They Are and How They Work On The Bitcoin Blockchain\n\nWhat is the blockchain?\n\nBitcoin BitcoinistThe blockchain, much like it’s name, is a transactional database shared between all nodes that are participating in the network of the Bitcoin protocol. A full copy of the Blockchain contains every transaction ever made, including the first transactions sent by Satoshi. At face value, the blockchain is just a list. Software development and innovation using the underlying technology give the blockchain incredible potential to do things that are not currently thought to be possible.\n\nThe blockchain links together transactional blocks. Blocks are essential to Bitcoin, they contain a record of recent transactions that have yet to be recorded on the chain, the answer to a difficult mathematical problem that is unique to that block (the answer that miners are competing to discover.), and the hash of the previous block, thus linking each block together. The properties of the blockchain make it incredibly difficult and impractical to attempt to modify a block that is present on the chain because each block that followed that block would have to be modified, something that is not feasible for several reasons. Because of the mathematical strength, double-spending (spending Bitcoin inputs twice) is very difficult to do as time progresses. I will cover the importance of scoring for “fast transactions” in another article, as the issue goes along with this.\n\nTheBitcoin Blocks blockchain continues to grow everyday as a new block is added roughly every ten minutes. The blockchain is only valid if all of the blocks lead back to the genesis block, or the first block ever created on the chain. If there is a disagreement between the network, the blockchain can fork or split into different chains. Under normal circumstances, the longest chain will be deemed correct by the system and any transactions on the shorter chain will be invalid. It is impossible to merge two different chains. Forks are a rare occurrence, likely only happening from a bad software error.\n\nThe blockchain will continue indefinitely, even after all 21 million Bitcoins have been mined. After the last of the block rewards have been claimed, miners will be paid in transaction fees, the fees paid to the network on each transaction to verify it.\n\nThese are the basic mechanics of the Blockchain, to record and validate all transactions within the network. The blockchain is public, anyone can view it at anytime. By finding ways to utilize the stored data, valuable metrics for Bitcoin can be established. You can see exactly how much Bitcoin a public address had stored at any given point in Bitcoin’s history. There are a variety of tools for exploring the blockchain., for instance, contains useful metrics for Bitcoin users.\n\nBe sure to check regularly for part two of our blockchain series!\n\nThe post All About: The Blockchain Part One appeared first on\n\n\n\nSold Out", "pred_label": "__label__1", "pred_score_pos": 0.95747971534729} {"content": "The impact of oil price shocks on household consumption : The case of Norway\n\nUniversity essay from Umeå universitet/Nationalekonomi\n\nAuthor: Viktor Boman; [2019]\n\nKeywords: ;\n\nAbstract: Since the end of World War II, oil price shocks and its impact on the economy have been a hot topic among economic researchers and agents. The price of oil has experienced several fluctuations during the late 20th century and the initial empirical findings suggest that these unexpected changes have several negative effects within countries’ economies. However, most of the research apply only on oil-importing countries and the same results from oil shocks aren´t expected for oil-exporting countries. Furthermore, the robustness of the relationship has recently come to be revaluated since many countries move towards alternative energy resources, thus moving away from its oil dependence.The purpose of this study is to examine the relationship between oil shocks and consumption for the small democratic economy of Norway. The choice of selecting an oil-exporting country for this analysis is somewhat unique since many of the world economies are oil-importers and the research made up until now are focusing on these economies. To do this, the study ends up with analyzing the short-run effects of oil shocks on household consumption by using a Vector autoregression model, Granger-causality test and an Impulse response function. The result suggests that there is a granger causality between oil shocks and consumption. Also, for Norway, we find that a shock due to increased crude oil prices has a positive short effect on household consumption.\n", "pred_label": "__label__1", "pred_score_pos": 0.9944154024124146} {"content": "How much does a Landscape Architect make in England?\n\n366 salaries reported, updated at 13 January 2021\n£31,571per year\n\nThe average salary for a landscape architect is £31,571 per year in England.\n\nWas the salaries overview information useful?\n\nWhere can a Landscape Architect earn more?\n\nCompare salaries for Landscape Architects in different locations\nHow much should you be earning?\nGet estimated pay range\nSee more details", "pred_label": "__label__1", "pred_score_pos": 0.9899533987045288} {"content": "Simple and reassuring or futuristic and bold models: all are an absolute must-have for the menswear wardrobe in winter too\n\n[On the cover: Versace and Sergio Rossi F/W 202021]\n\nIs it because sneakers were the most purchased type of footwear online during lockdown? Or does it have something to do with how they have become a no-season model, or how active and fashion wear have seamlessly converged? One thing’s for sure: sneakers continue to be a top menswear choice. All this without even mentioning the high level of creative content showcased by sneakers, veritable sources of experimentation for fashion brands and Italian companies. Transversal and suitable for all looks, sneakers make an effortless addition to various outfits: single colour and basic for urban apparel, or bursting with colour for less formal moments. They are a guarantee for any menswear wardrobe, even though the season is dominated by manifold ankle boot models.\n\nDespite not being the undisputed star of catwalks for autumn-winter 2020/21, sneakers have still captured attention due to their versatility and ability to satisfy all requirements. Total white models feature simple and reassuring lines; chunky models on the other hand showcase accentuated and daring soles; then there are futuristic models (one example that springs to mind is the Balenciaga sneaker with the Vibram Fivefingers sole), hybrid ones which combine technical soles with hiking footwear-style uppers, or high performance ones with cushioning and breathability characteristics. Here are the models to add to your wish list.", "pred_label": "__label__1", "pred_score_pos": 0.7529656887054443} {"content": "Sam Francis\n\nUntitled, 1984\n\n106.7 X 73 inch\n\n\nWhat means attribute?\n\nWhat means attribute?\n\nAttribute is a term which can function as a noun or a verb. The noun describes an object or an animal typically associated with a specific person; while a work of art may be attributed to a particular artist based on its style.\n\nMatter painting\n\nMatter painting is a technique which blends thick impasto pains with cement, mud, sand or shells. The term first emerged in the 1950s, describing the works of Belgian and Dutch painters who focused on painting materials and the different ways paint could be used.\n\nLyrical Abstraction\n\nDescriptive term that characterizes abstract painting type that has a close relationship with Abstract Expressionism and has been in use from 1940s to date. Lyrical abstraction may also be used to describe two distinct but related trends in the aftermath of second world war modernist artwork(painting in specific). This art movement was born in Paris, France after war.  \n\n\nObject in art is simply a thing which exists. Sometimes, that thing is the most important to see in a painting or drawing, and then it becomes the focal point. An object can be anything that can be touched or seen, depicted in art.\n\nCan't find your Answer?", "pred_label": "__label__1", "pred_score_pos": 0.9999404549598694} {"content": "More Dogs Going to Heaven Than Ever Before\n\nA new study of pet cemeteries reveals shifts in human-animal relationships.\n\nPosted Oct 29, 2020\n\nStephen King has established the pet cemetery (or ‘semetary’) in our collective imagination as a spooky place befitting of Halloween. But I don’t find pet cemeteries the least bit scary. To my mind, they offer a beautiful testament to the human-animal bond and the power of loss and mourning. They are also a goldmine for scholars studying human-animal relationships.  \n\n Leonard Bentley, Creative Commons\nThe Dog Cemetery at Hyde Park London.\nSource: Leonard Bentley, Creative Commons\n\nA recent example of “pet cemetery studies” is a study by historical archaeologist Eric Tourigny published in the journal Antiquity. Tourigny uses the pet cemetery to explore shifting patterns of human-animal relationship through the lens of mourning practices. Specifically, Tourigny uses gravestone markers at British cemeteries to delve into shifts in the way people think about animals and the afterlife from the Victorian period to the present (roughly from 1890 to 1980). These memorials, he writes, suggest that people struggle to define their relationships with pets and that feelings of love and attachment are often in tension with culturally accepted practices. Are deceased animals just pets, however beloved? Or are they family? Increasingly, he says, animals were viewed as something more than just pets, but something less than full-fledged members of the family. His findings also indicate increasing acceptance of the belief that animals have souls and that they go to heaven, where they will be reunited with their human loved ones.  \n\nTourigny looked at gravestones in four cemeteries in the UK, looking for shifts in how graves are marked (e.g., with headstone and footstone) and what is engraved on the markers. The vocabulary used on gravestones, he says, is typically quite simple: it includes the name of the animal and perhaps the date of death and sometimes a few details about the relationship: loyal friend or beloved pet. Many include the name of the person erecting the memorial, although by mid-century proper nouns are often replaced with pronouns such as ‘Mummy,’ ‘Dad,’ or ‘Nan.’ References to animals as family members increase after the Second World War and pet gravestones begin to feature the family surname. Sometimes the surnames are put into quotation marks, “as if to acknowledge they are not full members of the family” (p. 6). This, alongside the practice of having separate cemeteries for humans and pets, emphasizes “how people struggled to identify and label their relationships.” (p. 7) Animals are both family and not-family. (See my post Are Pets Really Family?)\n\nIn addition to showing increased references to animals as family, Tourigny’s analysis also indicates an increasing openness to the idea that animals have a soul and that human and animal companions may be reunited in the afterlife. Some gravestones reference Biblical scriptures that might be interpreted as suggesting that a deceased animal has a soul. For example, several feature Luke 12:6 (‘Not one of them is forgotten before God’) or Psalms 50:10 (‘Every beast in the forest is mine, saith the Lord’). Christian symbolism also becomes more prominent on animal gravestones toward the middle of the twentieth century. \n\n Andrew Stawarz/Flickr\nJet, Corrie, & Folly. Fine Dogs.\nSource: Andrew Stawarz/Flickr\n\nThe creation of cemeteries dedicated to the burial of pets in itself is evidence of shifting attitudes and tensions between conflicting cultural threads. For example, an increasing desire for public expressions of grief following the loss of a companion animal pulled against the disapproval of open grieving for “mere animals.” Pet cemeteries were separate from human cemeteries; deceased animals could be buried and marked but could not be buried on consecrated ground. Animals were not treated the same as humans.\n\nOne additional finding that I find quite interesting is that most gravestones in Tourigny’s study period were for dogs. As we progress through the 20th century, though, an increasing proportion of cats are represented. Cats, it seems, were finally getting their due.\n\n“Pet cemetery studies” can take us well beyond Tourigny’s research focus of 1890-1980 Britain and into the 21st century. In the past several decades, more and more human cemeteries in the UK, US, and elsewhere are welcoming animals and allowing humans to rest in peace alongside their animal companions. Gravestones are more likely to describe a deceased animal as really, truly part of the family, without the scare quotes and hedging. There has been growing attention to natural or “green” burial options for animals as well as people. And the number of people choosing cremation—including the environmentally-friendly option of water-based cremation—instead of burial has increased.\n\nPerhaps the most important shift, and one that I have not seen addressed in the research literature, is the increasing secularization and popularization of overtly religious language and imagery in the realm of pet loss and bereavement. Veterinarians as well as pet owners—including those with no religious affiliation--will often refer to “heaven” (e.g., Home to Heaven In-Home Euthanasia service; “Fluffy is in heaven now,” “Kitty has gone to a better place.”) and angel wings (e.g., a euthanasia vet may say, at the moment of an animal’s death, “Bingo has his wings”). The popular Rainbow Bridge imagery also explicitly refers to animals entering heaven—although animals have to wait patiently on the “wrong” side of the bridge until their human owner dies and they can be reunited and cross to heaven together.  (I wrote about animal heaven a few years ago.)\n\nPet cemeteries are fascinating expressions of how we humans react to the death of our animal companions and are rich resources for scholarly study and individual reflection. What I would really like to know, this Halloween, is whether dogs and cats become ghosts.\n\n\nEric Tourigny. “Do all dogs go to heaven? Tracking human-animal relationships through the archaeological survey of pet cemeteries,” Antiquity 2020.", "pred_label": "__label__1", "pred_score_pos": 0.9747474193572998} {"content": "read 5 min\n\nChina has always counseled Nepal to maintain a healthy relation with our southern neighbour India, despite the unconcealed reality that New Delhi wants to thwart every move made by Kathmandu to creep closer to Beijing. It is actually quite a mystery among Nepalis why China provides such counsel. One can surmise that China does not want to jeopardize its relations with India over Nepal. Equally, such a stance also impacts global perception, which itself occupies an important place in international relations. But how does China actually perceive Nepal-India relations? Everyone knows that Beijing reckons that Nepal-India relations are rooted in cultural and civilizational ties, which are undergirded by people-to-people relations. This contrasts with the Nepal-China relationship, which is for the most part informed by the interests of Nepal and China.\n\nFor the Nepali public, it’s not difficult to infer India’s intentions. One merely has to observe the latter’s behaviour. But historically, the Nepali public has had very few opportunities to get acquainted with the Chinese mind. Thus, up until now, we have been able to observe only the overt behaviours of the Chinese. We have not been able to deeply understand how China actually thinks when it comes to Nepal, and especially, how it views Nepal-India relations.\n\nHow does China Think?\n\nIndia claims South Asia as its traditional sphere of influence. However, with the alarming growth of China’s presence in South Asia, through Chinese investment and aid, India’s claim over its traditional sphere of influence has definitely shrunk. But such aid and investments by China make for merely the discernible aspects of China’s diplomacy. What motives trigger such actions? China’s intent is probably not only limited to checking Indian influence in the region, because there have been some rare occasions when both nuclear powers didn’t contest certain contentious claims–indeed, when they actually resorted to collaborating together to resolve issues. India’s recent announcement of the pilgrimage route to Kailash Mansarovar via Lipulekh Pass, in Nepal, seems to have resulted from that same kind of India-China quid-pro-quo thinking.\n\nIn 2015, when Nepal was focused on dealing with post-earthquake relief, rehabilitation, and reconstruction, India and China, without Nepal’s consent, decided to use Nepal’s Lipulekh as a trading point. That agreement between India and China not only stirred controversy in Nepal, but also raised questions about the intent of Nepal’s two immediate neighbours. Besides dwelling on anti-India sentiments, the public in Nepal often wonders why Beijing agreed that New Delhi could use this route, given that Nepalis have always regarded China as a friendly and welcoming neighbour. And this despite some of us knowing that Chinese President Xi Jinping and Indian President Narendra Modi agreed on the Lipulekh corridor without Nepal’s consent. The 41-point agreement, signed on May 15, 2015 between China and India, called for, among other things, “enhancing border-area cooperation through border trade, pilgrimage…and to expand border trade at Nathu La and Qiangla/Lipu-Lekh Pass and Shipka La”. \n\nUnderstanding India’s motives and intent behind their interventions in Lipulekh is not difficult. What’s startling is that amidst the current pandemic–when Nepal has closed its borders with India and China–New Delhi chose to inaugurate a new Kailash Mansarovar pilgrimage route via Lipulekh Pass. What makes the move strategic is that its inauguration wasn’t done by the Ministry of Road Transportation and Highways, but by the defense minister himself. India’s strategic interest in Nepal dates back to the 1950s, when the Indian leadership recognized the Himalayas as a defensive bulwark. On December 6, 1950 Prime Minister Nehru stated in the Indian Parliament that “from time immemorial, the Himalayas have provided us with a magnificent frontier…we cannot allow that barrier to be penetrated because it is also the principal barrier to India”. \n\nThe construction of the Indian road linking Uttarakhand’s Pithoragarh with Kailash Mansarovar via the Lipulekh corridor probably stems from India’s security interests regarding Nepal, though the route is ostensibly identified by India as a pilgrimage route. In fact, it has been named “Kailash Mansarovar Yatra”. And it is not mere coincidence that India decided to announce the opening of the new route in the middle of the lockdown, when no pilgrim will be able to travel to Kailash Mansarovar, at least in the foreseeable future. But the route leads to Kailash Mansarovar, which lies in China’s Tibetan Autonomous Region (TAR). \n\nRead also: Govt’s objection to Lipulekh road: strong in tone, weak in effect\n\nWhen the Araniko Highway, meant to link Nepal’s capital to the Chinese border, was being built, Chairman Mao had said that “once these roads are opened, India may be a bit more respectful of you”. Today, China’s acceptance of India’s new route to Kailash Mansarovar through Lipulekh not only weakens Nepal’s claim over Lipulekh, but also starkly exposes the limitations of small states like Nepal. \n\nThe Sino-Indian relation\n\nIn recent years, the trade volume between India and China has increased significantly, and both nations are eyeing an all-weather trading route to further expand bilateral trade over land routes. Although the two countries share a 3,488km land border, the Nathula Pass is the only functioning trade route between them. And the Nathula Pass is not a route that remains open year-round. In fact, the pass was closed after the 1962 India-China War, reopening only in 2006. Hence, Lipulekh presents the best alternative to the Nathula Pass for increasing India-China trade and connectivity via land. \n\nIt’s also notable that the year 2015 wasn’t the first time that both these Asian giants agreed upon the Lipulekh route. In this regard, Nepal’s ‘historical amnesia’ needs to be condemned. In 1954, India and China agreed to permit India’s Mansarovar-bound pilgrims to use Lipulekh Pass for the first time. Further, in 1999, during Indian External Affairs Minister Jaswant Singh’s visit to Beijing; in 2005, when Chinese Premier Wen Jiabao visited New Delhi; and in 2014, when Chinese President Xi Jinping visited India, both countries discussed the issue of using the Lipulekh route for trade and pilgrimage. These meetings clearly indicate that India and China do not have divergent views on Nepal’s claim to Lipulekh. But that makes the Nepali public wonder why China is planning to extend the Qinghai-Tibet railway to Nepal’s border with India–when New Delhi and Beijing have already jointly decided to use Lipulekh Pass as a trade corridor.\n\nRead also: The Indian checkposts, Lipu Lekh, and Kalapani\n\nWhile Nepal was waiting for the Chinese response to India’s constructing a road inside Nepal’s territory, we learned that Indian and Chinese soldiers were injured in a cross-border clash during a face-off at a remote crossing point near Tibet. Once again, the Nepali public puzzled over the contours of the Sino-Indian relation, and struggled to delineate the nuances of how the two nations view their relation through their prism of conflict, cooperation, and competition. Although the Xi-Modi Wuhan meeting of 2018 aimed to stabilize their bilateral relation, the relation is still plagued by border problems, struggles pertaining to global governance, and their contest for regional supremacy. All these issues have actually made for a major 21st century rivalry. Nonetheless, whenever China and India cooperate on some issues pertaining to the TAR, while confronting each other on other TAR issues, Nepalis can’t fathom what is actually happening. \n\nInferring motives\n\nKathmandu has always looked to Beijing whenever Delhi attempts to dilute Nepal’s sovereign right as a modern state. When Nepal promulgated its new constitution in 2015, China welcomed it unconditionally, whereas India greeted the statute with a blockade that eventually obliged Nepal to sign the Transit and Transportation agreement with Beijing in 2016, which provided Kathmandu access to the Chinese port of Tianjin. Today, Nepal has access to seven Chinese sea and dry ports, and Beijing has become a significant player in Nepal’s politics and economy. And yet, Nepal isn’t sure whether China will respect its territorial integrity or not, even as Kathmandu awaits Beijing’s response to India’s announcement of the Lipulekh route. Nepal’s lack of confidence in its relationship with China has been undeniably undercut by its recurring failures in understanding China’s motives. \n\nNepal could have better understood China’s motives in 2015, when China paid no heed to Nepal’s calling out its neighbors over Lipulekh. Also, Nepal could have diplomatically lobbied its cause after 2015, despite its small-state syndrome, and asked Beijing not to ink further agreements over Lipulekh. For now, instead of merely hoping that we will someday figure out Beijing’s stance on Lipulekh, it would be better if Nepal could realize that without understanding Beijing’s motives, Nepal’s hopes and aspirations about working with the northern neighbor, mainly on matters related to growth-oriented prosperity and infrastructure-propelled development, cannot be materialized. More importantly, that understanding needs to percolate down to the public as well.", "pred_label": "__label__1", "pred_score_pos": 0.9513323307037354} {"content": "A medical doctor aide in the United States, Canada and numerous various other countries decide on places of research study at area universities or even trade schools. The training generally takes 3 to four years. A handful of years of college as well as the finalization of a Doctoral Level training course will suffice for these trainees to come to be eligible for employment as an in some of these clinical specialties. Numerous workplaces provide task placement solutions after trainees have actually passed the accreditation observation through passing the panel exam.\n\nIn overall, there are actually two types of medical professional assistants in strategy. These are actually case supervisors and specialist associates.\n\nTraining is actually demanded for this profession. A training course on anatomy, anatomy and case history is provided just before the beginning of the doctoral course. The subjects consisted of in these programs are actually based on professional adventures in a true medical center. In the course of the training time period, the pupils are actually instructed about document maintaining, invoicing, insurance policy proof, lab treatment, pharmacology, statistics as well as managerial tasks. The medical professional aide additionally receives significant technical instruction in computer system software application, diagnostic devices as well as evaluation devices.\n\nThe tasks of a consist of assisting medical doctors in checking out patients, always keeping individual medical histories, ordering research laboratory exams, and also recording these exam results. They additionally assist the medical professional in making clinical documents such as prescriptions and also case histories. Besides these tasks, the associates help the doctor in patient care through addressing phone calls, providing clinical suggestions and teaching the people regarding health care problems. The aides are frequently the very first people to communicate along with clients concerning health care worries.\n\nA doctor aide is actually needed to have a higher college degree or the equivalent to acquire this career began. Once the pupil passes the qualification test, he or even she will be a licensed assistant.\n\nThere are many places of the health care area where medical professional associates are going to be demanded. Other locations of the medical doctor assistant occupation consist of pediatrics, nursing, transmittable diseases, neurology, pulmonology, as well as ladies’s reproductive health and wellness.\n\nThe needs for many medical professional associate jobs are schooling, certification, as well as on-the-job training. Pupils curious about entering this field must contact a neighboring college to figure out what the needs are actually. Those that are approved medical professionals assistants will require to accomplish a Medical professional Assistant Plan. This course lasts coming from a couple of years. Students in the course need to discover just how to detect a patient and also take thorough notes in the clinical workplace. A few of the syllabus might likewise feature knowing physiology, health care language, record keeping, physiology, pharmacology, as well as radiology.\n\nAides are actually able to conduct numerous tasks in the clinical atmosphere including addressing phone telephone calls, filing paperwork, and dealing with economic matters. Health care assistants are called for to comply with specific criteria prior to being worked with.\n\nTo get work as a medical assistant, pupils need to acquire certain skills. Clinical associates should be actually prepared to accept any kind of tasks that are actually handed to all of them. In addition to taking and passing a health care assistant instruction program, students are going to need to effectively total condition and also nationwide accreditation panels.\n\nA physician associate in the UNITED STATE, Canada as well as lots of other western side nations or physician colleague in the U.K. Obligations of a Doctor Aide (PA) are actually commonly defined as medical medical diagnosis, healing care, preventative treatment and related roles. The range of benefit a PA varies depending on to the region, sort of organization as well as hours functioned. Commonly, a PA is required to accomplish a total training program in a wellness treatment academic facility as well as get a degree or degree in a related medical specialty.\n\nThere are actually a number of responsibilities that medical doctor associates may perform. Doctor assistants may additionally perform a variety of health care procedures, such as suturing, drain, banding and opening, skin layer grafting, chest surgical treatment, anesthesia management, removal of the spleen, belly and bowel, gastric operative treatments, joint substitute, lumbar or pelvic surgeries as well as consultation solutions.\n\nThere are many articles of medical professional aides in various medical centers, nursing homes, rehab clinics and also doctor centers spread all over the country. To obtain nationwide accreditation as a doctor aide, prospects should pass the PA test as well as possess at minimum 6 years of adventure as a PA. Karl Anthony Simon\n\nAs a component of becoming an accredited PA, it is crucial to accomplish an internship in a medical care setup. Teaching fellowships give applicants a chance to acquire hands on adventure with a and receive a chance to trail a practicing medical professional. It is actually additionally good for develop a customer foundation as a physician assistant. Usually, the moment a trainee has the capacity to obtain qualification, they are going to have the ability to look for work in an assortment of medical care setups featuring medical facilities, nursing properties, physician workplaces and also additional.", "pred_label": "__label__1", "pred_score_pos": 0.920295774936676} {"content": "Chapter 15\nhomeostasis in the blood (Chapter 16) and is also the process\nby which some cholesterol-lowering drugs work. Dietary fi ber\nalso sequesters bile and thereby lowers plasma cholesterol.\nCholesterol is insoluble in water, and its solubility in bile is\nachieved by its incorporation into micelles (whereas in blood,\ncholesterol is incorporated into lipoproteins). Gallstones, con-\nsisting of precipitated cholesterol, will be discussed at the end\nof this chapter.\nBile pigments\nare substances formed from the heme\nportion of hemoglobin when old or damaged erythrocytes\nare digested in the spleen and liver. The predominant bile pig-\nment is\nwhich is extracted from the blood by liver\ncells and actively secreted into the bile. Bilirubin is yellow and\ncontributes to the color of bile. During their passage through\nthe intestinal tract, some of the bile pigments are absorbed\ninto the blood and are eventually excreted in the urine, giving\nurine its yellow color. After entering the intestinal tract, some\nbilirubin is modifi ed by bacterial enzymes to form the brown\npigments that give feces their characteristic color.\nThe components of bile are secreted by two different cell\ntypes. The bile salts, cholesterol, lecithin, and bile pigments\nare secreted by hepatocytes, whereas most of the bicarbonate-\nrich salt solution is secreted by the epithelial cells lining the\nbile ducts. Secretion of the salt solution by the bile ducts, just\nlike the secretion by the pancreas, is stimulated by secretin in\nresponse to the presence of acid in the duodenum.\nBile salt secretion is controlled by the concentration of\nbile salts in the blood, unlike the pancreas, whose secretions\nare controlled by intestinal hormones. The greater the plasma\nconcentration of bile salts, the greater their secretion into\nthe bile canaliculi. Absorption of bile salts from the intes-\ntine during the digestion of a meal leads to their increased\nplasma concentration and thus to an increased rate of bile salt\nsecretion by the liver. Although bile secretion is greatest dur-\ning and just after a meal, the liver is always secreting some\nbile. Surrounding the common bile duct at the point where it\nenters the duodenum is a ring of smooth muscle known as the\nsphincter of Oddi.\nWhen this sphincter is closed, the dilute\nbile secreted by the liver is shunted into the gallbladder. Here,\nthe organic components of bile become concentrated as NaCl\nand water are absorbed into the blood.\nShortly after the beginning of a fatty meal, the sphincter\nof Oddi relaxes and the gallbladder contracts, discharging con-\ncentrated bile into the duodenum. The signal for gallbladder\ncontraction and sphincter relaxation is the intestinal hormone\nCCK—appropriately so, because as we have seen, the presence\nof fat in the duodenum is a major stimulus for this hormone’s\nrelease. It is from this ability to cause contraction of the gall-\nbladder that cholecystokinin received its name:\nto move.\nFigure 15–31\nsummarizes the factors\ncontrolling the entry of bile into the small intestine.\nSmall Intestine\nApproximately 1500 ml of fl uid is secreted by the walls of the\nsmall intestine from the blood into the lumen each day. One\nof the causes of water movement (secretion) into the lumen is\nBile salts\nBile salts\nbile duct\nSynthesis 5%\nportal vein\n5% lost\nin feces\nSmall intestine\nFigure 15–30\nEnterohepatic circulation of bile salts. Bile salts are secreted into\nbile (green) and enter the duodenum through the common bile\nduct. Bile salts are reabsorbed from the intestinal lumen into hepatic\nportal blood (red arrows). The liver (hepatocytes) reclaims bile salts\nfrom hepatic portal blood.\nFigure 15–30\nIn addition to the hepatic portal vein, can you name another\nportal vein system and explain the meaning of the term “portal”?\nAnswer can be found at end of chapter.\nSphincter of Oddi\nPlasma CCK\nFatty acids\nCCK secretion\nBile flow\ninto duodenum\nBile flow into\ncommon bile duct\nFigure 15–31\nRegulation of bile entry into the small intestine.\nprevious page 582 Vander's Human Physiology The Mechanisms of Body Function read online next page 584 Vander's Human Physiology The Mechanisms of Body Function read online Home Toggle text on/off", "pred_label": "__label__1", "pred_score_pos": 0.8909274935722351} {"content": "Trump’s assets evaporated by 2 billion\n\nAccording to the Russian satellite news agency reported on the 16th, in 2016, the billionaire trump was elected president of the United States, but in his four-year term, he fell 183 to 339 on the Forbes 400 list.\nTrump’s net assets are expected to plummet from $4.5 billion in 2016 to $3.5 billion in 2016. In 2016 alone, he spent about $66 million in personal funds to support his presidential campaign and raised a total of $368 million.\nHowever, it may not be because of the presidency that the billionaire’s fortune has shrunk, because many of the things trump has done in the past four years have been paid for by American taxpayers. For example, transportation costs are about $350 million a year, and it is estimated that an additional $41 million will be needed to maintain adequate security in the White House and Trump’s private residences (such as sea lake manor).\nAccording to Forbes magazine, Trump’s wealth shrank the most in 2017 and 2020. While the fortune of the billionaire in New York City fell from $3.7 billion to $3.7 billion at the end of 2016, and pointed out that trump owned a large amount of wealth in the two areas from the end of 2016 to the end of 2016.\nTrump’s wealth fell sharply for the second time in 2020, to $2.5 billion today. But unlike in 2016, trump did not use any personal savings in his 2020 campaign, but raised $557 million. The magazine points out that the new coronavirus pandemic is the main reason for Trump’s wealth to shrink in 2020. Trump’s main source of wealth is his many hotels, office buildings and golf courses, which have suffered huge losses with the implementation of the epidemic blockade, people working at home and some enterprises closing under the pressure of the epidemic.\nAccording to Forbes, the only asset trump will appreciate in 2020 is the trump world building. His other assets are deficits of varying degrees, leading to a sharp decline in the president’s wealth, which is also reported to be carrying millions of dollars in debt. Earlier, several U.S. media reported that trump had accumulated $400 million to $1 billion in overseas debt in recent years. Trump himself refuted the reports, calling them “false news.”.\n\nTwo yuan for thousands of face photos\n\n“Brush face” payment when shopping, unlock “brush face” when using mobile phone, and “brush face” open door when entering the community Nowadays, more and more things can be “washed” and solved by face recognition technology.\nAccording to a report released recently, more than 90% of the respondents have used face recognition, but 60% of the respondents think that face recognition technology is likely to be abused. Another 30% of the respondents said that they have suffered privacy or property loss due to the leakage and abuse of face information. So, is our face information safe in the “face brushing” era?\nWhat are the risks of face recognition?\nFor face recognition, most people love and hate it. What they love is that it is convenient and fast, and what they hate is security risks.\nSuspect “Ai face changing” deceives face recognition to commit crime\nIn the two cases of police embezzlement of citizens’ personal information this year, it is worth noting that the suspects used the “AI face changing technology” to illegally obtain citizens’ photos for preprocessing, and then generated dynamic video through “photo activation” software, deceived the mechanism of face verification, so that they could commit crimes.\nCan masks replace faces to unlock mobile phones?\nIn the test, researchers put a mask on the opposite side of the mobile phone and then adjusted the light, color temperature and angle. After several comparisons, the phone was successfully unlocked.\nExperts say the cost of making this mask is not high, and 3D printing technology can produce face masks or headgear with acceptable accuracy. As long as it is not in a very dark or bright background, the success rate of face recognition by mask or headgear is as high as 30%.\nHow to enhance the security of face recognition?\nExperts say that the simplest face recognition at present only needs to collect and extract six or eight feature points on the face. For complex face recognition, it needs to collect and extract dozens or even hundreds of feature points on the face. Compared with unlocking the mobile phone, “face brushing” payment and “face brushing” into the community, the collected face feature points are more, and the security is naturally higher.\nIn addition, we have developed a biometric based in vivo detection technology, which can effectively identify the vital signs of the scanned object, and greatly reduce the risk of the recognition system using photos or masks as faces.\n2 yuan can buy thousands of photos, how is the face information leaked?\nAccording to the survey, on some online trading platforms, thousands of face photos can be bought for only 2 yuan, while the price of more than 5000 face photos is less than 10 yuan.\nThe store’s material library is full of personal privacy, such as real life photos and self photos. When the reporter asked the customer service whether the pictures involved copyright, the customer service denied it, but could not provide any material to prove the copyright of the photos.\nIf these face photos containing personal information fall into the hands of criminals, the photo owners may not only encounter accurate fraud and suffer property losses, but also be involved in criminal proceedings because their face information is used for money laundering and other illegal and criminal activities.\nIn the opinion of experts, the risk point of face recognition technology is more concentrated in the storage link. Due to the diversity of face recognition applications and the lack of a unified industry standard, a large number of face data are stored in the centralized database of application operators or technology providers.\nWhether the data is desensitized, whether the security is in place, what is used for algorithm training, and which will be shared by partners is unknown to the outside world. Moreover, once the server is intruded, the highly sensitive face data will face the risk of leakage.\nThe draft of personal information law is issued, and the protection of face information is more standardized\nIn order to plug this loophole, experts put forward a variety of technical improvements, and further pointed out that face data storage should establish more stringent standards and norms, technology developers and app operators should collect, use and store data under more stringent supervision, laws and industry standards.\nIn view of the phenomenon that face information is abused, embezzled and collected at will, legal experts point out that the network security law explicitly includes personal biometric identification information into the scope of personal information. China’s “Civil Code” stipulates that the collection and processing of personal information of a natural person should follow the principles of legality, legitimacy and necessity, and obtain the consent of the natural person or his guardian, and the consent of the adoptee can also be withdrawn.\nAt present, the personal information protection law of the people’s Republic of China (Draft) is open to the public for comments. The draft proposes that the installation of image acquisition and personal identification equipment in public places should be necessary for the maintenance of public security, comply with the relevant national regulations, and set up prominent prompt signs. The collected personal images and personal identity information can only be used for the purpose of maintaining public security, and shall not be made public or provided to others, except with the individual’s individual consent or otherwise provided by laws and administrative regulations.\n\nFake advertisement of news app\n\nCCTV exposes fake advertisement on news app", "pred_label": "__label__1", "pred_score_pos": 0.9826322793960571} {"content": "What is the long-term effect of Ritalin on the brain ?\n\nSource: American College Of Neuropsychopharmacology\nDate: 29 December 2004\n\n\n\n\n“Attention-deficit hyperactivity disorder can be a serious medical problem for children and their parents,” says lead researcher William Carlezon, Ph.D., director of McLean Hospital’s Behavioral Genetics Laboratory and associate professor of psychiatry at Harvard Medical School. “While Ritalin is an effective medication that improves the quality of life for many children with ADHD, accurately diagnosing and identifying the correct treatment regimen for the disorder is essential, especially when considering health effects that can last through adulthood.”\n\n\nBecause most children show some of these behaviors of inattention and hyperactivity at times, the diagnosis of ADHD is a complex process that should involve specialists. It is critical to determine whether a child’s behavior is simply immature or exuberant, related to another issue such as a vision problem or learning disability, or is characteristic of a disorder such as ADHD.\n\nIn the work funded by the NIH, Dr. Carlezon and his chief collaborator, Dr. Susan Andersen, examined the effects of exposing rats to Ritalin during early development on behaviors later in life. They exposed normal rats to twice-daily doses of Ritalin during a period that is equivalent to approximately 4-12 years of age in humans. Examining the behavior during adulthood, Carlezon and Andersen conducted several types of tests that all showed that the animals had a reduced ability to experience pleasure and reward, particularly when it was measured by sensitivity to cocaine. In addition, they found that the animals exposed to Ritalin during pre-adolescence were more prone to express despair-like behaviors in stressful situations (such as swim tests) as adults. Overall, the animals showed more evidence of dysfunctional brain reward systems and depressive-like behaviors in adulthood.\n\nThese findings are critical because they suggest that Ritalin can have long-term consequences on normal-functioning brains. The study is particularly relevant when considering the difficulty in correctly diagnosing children with ADHD. In 1999, approximately 90 percent of children diagnosed with the disorder were taking Ritalin, with children beginning drug therapy at younger ages today, even during preschool in some instances. There is increasing evidence to suggest that correct diagnosis of ADHD is of the highest importance children who are misidentified as having ADHD and subsequently placed on prescription drug therapy could face possible impaired brain performance as adults.\n\n“Ritalin can be highly effective in the treatment of ADHD, but our work highlights the importance of getting a proper diagnosis”, states Carlezon. “Although individuals such as teachers and coaches can assist in identifying children with the disorder, an experienced health care professional is best-trained to make the final assessment and recommend avenues of treatment.”\n", "pred_label": "__label__1", "pred_score_pos": 0.7501066327095032} {"content": "China threatens 'counterstrike' over US contact with Taiwan\n\n·2-min read\nChina has threatened a 'resolute counterstrike' after US Secretary of State Mike Pompeo lifted restrictions on official contacts with Taiwan\n\nChina on Monday threatened a \"counterstrike\" against a move by the United States to lift restrictions on official contacts with Taiwan as military tensions grow between Beijing and the self-ruled island.\n\nUS Secretary of State Mike Pompeo said Saturday Washington would lift \"complex internal restrictions\" on contacts with Taipei by diplomats, after a year of mounting US-Chinese friction on topics including human rights, trade and the origins of the Covid-19 pandemic.\n\n\nChinese foreign ministry spokesman Zhao Lijian said Beijing \"strongly condemns\" the move and accused the United States of violating the terms of Washington's diplomatic relations with Beijing.\n\n\"Any action that harms China's core interests will receive a resolute counterstrike from China,\" Zhao warned, urging Pompeo to retract the decision or face \"severe punishment\".\n\n\n\nBut Washington remains a staunch ally of Taipei and is bound by Congress to sell it weapons for self-defence. It opposes any move to change Taiwan's current status by force.\n\nMilitary tensions between mainland China and Taiwan have grown sharper in the past year -- reaching their worst since the mid-1990s, some analysts say.\n\nChinese jets made a record 380 incursions into Taiwan's defence zone last year, a military official said Tuesday.\n\nBeijing's animosity has increased dramatically since Tsai Ing-wen won election as Taiwan's president in 2016 -- she rejects Beijing's insistence that the island is part of \"one China\".", "pred_label": "__label__1", "pred_score_pos": 0.7307916879653931} {"content": "SeeYouDoc, a telemedicine platform, was named as one of ten winners of QBO Innovation Hub’s “RESQUE: Startups vs COVID-19” competition. The nationwide contest aims to recognize the 10 startups with the most compelling COVID-19 related innovations and pivot strategies to ensure business sustainability by addressing the new challenges faced by Filipinos in the new normal.\n\nThe competition was organized by startup incubator QBO Innovation Hub, in partnership with Youth Business International (YBI) and Google’s philanthropic arm,\n\nChosen from a wide range of industries such as education, medical care, technology, agriculture, and finance, each winner will receive PHP 100,000 cash prize to help boost the development of better products and services as well as to expand reach to allow more people to access them.\n\nSeeYouDoc Founder and CEO Noel Del Castillo presenting at QBO's \"Virtual Demo Day\"\n\nThe selection process was very competitive. We received an overwhelming response of over 100 entries in a few weeks, but in the end, we’re extremely proud of the startups making it through. I hope Demo Day brought a glimmer of optimism and hope in these challenging times,” said Katrina Rausa Chan, Director of QBO.\n\nThe winning startups will undergo 2 months of support programs such as business consultations with industry leaders aimed at providing technical and business know-how to better equip them as they navigate the business landscape amid the COVID-19 crisis.\n\nThis is a huge win for us. Our efforts in building a telemedicine platform for patients and doctors have been validated. The guidance and support that this program offers will help us grow and continue our mission in improving our healthcare industry,said  Noel Del Castillo, Founder and CEO of SeeYouDoc.\n\nHere are the 10 winning startups of QBO’s ‘RESQUE: Startups vs. COVID-19’ competition:\n\nAgro-DigitalPH (Agriculture)\n\nA startup that provides an e-commerce portal for cooperatives and small farmer organizations to consolidate their assets and capabilities to match produce with demand from both retail and institutional consumers for a more sustainable business.\n\nEskwelabs (EdTech)\n\nAn online learning platform geared towards building skills for individuals and teams to succeed in an increasingly data-driven world. Eskwelabs provides free online courses, self-paced lessons, as well as flexible ‘pay-what-you-can’ tuition models to cater specifically to learners who might be affected by the COVID-19 situation.\n\nFilipina Homebased Moms (Education and Job Matching)\n\nA support group for mothers transitioning to freelance jobs and entrepreneurship. The group provides training, e-commerce tools, and job-matching to enable mothers to achieve the lifestyle they envision for them and their family.\n\nFuturistic Aviation and Maritime Enterprise, Inc. (Tech)\n\nProvides reliable, secure, easily deployable and affordable solutions to connect devices for real-time intelligent monitoring and management of resources.  In response to the COVID-19 crisis, the company helped develop Ruwah 2.0 Oxygen concentrator, a temporary respirator a patient can use until a ventilator becomes available.\n\nNextPay (Finance)\n\nA one-stop payment platform specifically catering to MSMEs and entrepreneurs. NextPay allows business owners to easily manage their finances such as payroll and supplier payments without the costly requirements and limitations common to traditional bank services\n\nRumarocket (Recruitment and Tech)\n\nProvides an AI tool that helps companies identify, optimize, and retain the right talent for the right positions to meet the right needs of companies at the right time. Recognizing the importance of mental health during the COVID-19 crisis, Rumarocket developed an AI model that can look at benchmarked depression and anxiety scores to provide free assessment and results to individuals.\n\nSeeYouDoc (Health and Medical Care)\n\nA telemedicine app that allows users to receive health care services online anywhere anytime. With the coronavirus, patients are recognizing both the convenience and the safety of telemedicine as an alternative for in-person clinic visits in addressing minor health care needs such as consultations and doctor prescriptions.\n\nSukiPlus (Finance and Lending)\n\nA platform that connects unbanked micro-entrepreneurs to mainstream financial institutions, using alternative data and retail solutions to help them get access to working capital loans at more reasonable rates.\n\nTwala (Tech)\n\nAn e-signature platform that uses advanced Ethereum blockchain for a secure, private, and legally binding digital signature. The technology allows the signing of any digitized document using any device, thus reducing contract cycle time from weeks to just minutes.\n\nZagana (e-Commerce and Agriculture)\n\nZagana is an online platform for fresh fruits and vegetables. It is a social enterprise that aims to uplift the lives of our Filipino farmers by allowing consumers to purchase safe and healthy produce directly from local farmers to your kitchen.", "pred_label": "__label__1", "pred_score_pos": 0.9850594401359558} {"content": "Meet Ethan Schubert, Your Theology and Worldview Editor\n\nMeet Ethan Schubert, your Theology and Worldview Editor! Ethan is a 17-year old El Paso born Texan who moved to Bandung, Indonesia (Western Java) just before his second birthday. One year later, he and his family moved to Batam, Indonesia, a tiny island just south of Singapore. And one year after that move, his family moved to a different house on the same island. He is the oldest of four children, and some of his hobbies include reading, playing pickup sports or board games, and learning languages. His favorite board/card game is Dominion, but do not try to challenge his interpretation of the rules. He convinces his opponents of his ways in the end, but “it wastes 5-10 minutes trying to prove our reasoning.” Also among his favorites are the Lord of the Rings books, the movies Emperor’s New Groove and the Life of Pi, and an Indonesian dish called Beef Rendang, beef slow-cooked in coconut milk and spices served with hot sauce and rice. His favorite Bible verse is probably Hebrews 11:13-17. Speaking of food, Ethan has eaten a variety of bizarre foods, including dog, rat, and a live grub worm. Clearly you all are jealous of his extravagant dining experiences.\n\nEven though he spent the summer landscaping, he wants to go to college either for business management or creating language learning software. He also wants to continue traveling and exploring the world. His personality type is the INTJ, and he enjoys being around and having deep conversations with people. But like most of us, he does need a few hours of space during the day. One of his unique traits is cracking/popping his nose. If you ever meet him, he probably will show you.\n\nWhile he has never participated in a snowball fight (living in Indonesia will do that to a person), he would constantly be on the move and always have two snowballs on him at once, a common yet very dependable strategy for open field combat.\n\nEthan will be going into his 5th and final year with TPS and is taking several classes. He will be in AP English Language, AP Environmental Science, AP Statistics, Arabic 3, US Government and Civics, and quite fittingly Theology Matters.\n\nSome advice that Ethan gives is to “make a habit of sharing a lot with God, especially making time for the little things, [as well as] asking Him questions and taking time to listen.” Additionally, he would like to share one of his favorite quotes that doubles as a handy piece of advice, “Never laugh at live dragons, Bilbo you fool!”\n\nWe look forward to Ethan’s editorial skills and his role in clay.\n\n\n 1. Ah yes…the live grub worm….\n\n Have fun editing this year, Ethan! You’ll do awesomely!\n\n 2. I love how this picture makes your hair look glittery.\n\n 3. No riddles for us today, Ethan? Better come back to Summer Camp again so you can continue to stump us every meal time.\n\n • I have to agree with Leanne. Those riddles are the best\n But I do have to say… rats, grub worms, and dog? Yikes… That might just be weirder than fish eyes XD\n\n 4. Make me proud Ethan, I know you will 😛", "pred_label": "__label__1", "pred_score_pos": 0.9612546563148499} {"content": "A ripoff of this challenge. Go upvote it!\n\n\nGiven a rational number amongst \\$[0,1]\\$, apply the Cantor function to it and output the rational number that's produced.\n\nThe Cantor function\n\nThe Cantor function is continuous everywhere and constant almost everywhere, but has an average slope of 1:\n\n\nThe Cantor function \\$f(x)\\$ can be expressed as a limit \\$f(x)=\\lim\\limits_{n\\to\\infty} f_n(x)\\$ of a sequence of functions \\$f_0, f_1, f_2, \\dots\\$, which are defined recursively as:\n\n\n\\$f_{n+1}(x)=\\left\\{\\begin{matrix}\\frac{1}{2}f_n(3x)&x\\in[0,\\frac{1}{3})\\\\ \\frac{1}{2}&x\\in[\\frac{1}{3},\\frac{2}{3})\\\\ \\frac{1}{2}+\\frac{1}{2}f_n(3x-2)&x\\in[\\frac{2}{3},1] \\end{matrix}\\right.\\$\n\niteration limit\n\nYour task is to compute \\$f(x)\\$ for the rational \\$x \\in [0,1] \\cap \\mathbb{Q}\\$ given as input.\n\n\nThough this task might seem impossible, this is actually possible, for the Cantor function is computable.\n\nA step-by-step solution for \\$x \\in \\mathbb{R}\\$:\n\n 1. Ternary-expand \\$x\\$ to \\$0.t_1t_2t_3\\cdots\\$.\n\n 2. Write \"0.\".\n\n 3. Set \\$n=1\\$.\n\n 4. If \\$t_n = 1\\$, write \"1\" and halt.\n\n • Otherwise, if \\$t_n = 0\\$, write \"0\", increment \\$n\\$, then continue doing step #4.\n\n • Otherwise (\\$t_n = 2\\$), write \"1\", increment \\$n\\$, then continue doing step #4.\n\n 1. Parse the resulting string as a binary expansion of a real number.\n\nAs \\$x\\$ actually is in \\$\\mathbb{Q}\\$ in this challenge, you should exploit the fact that the ternary expansion of \\$x\\$ repeats. It follows that the output is also in \\$\\mathbb{Q}\\$.\n\n\n$$ \\begin{array}{r|c|c|c|c|c|c|c|c|c|c} x & 0 & ½ & ⅓ & ¼ & ⅕ & ⅚ & 1 \\\\ \\hline \\text{Ternary expansion of }x & 0.\\overline{0} & 0.\\overline{1} & 0.1\\overline{0} & 0.\\overline{02} & 0.\\overline{0121} & 0.2\\overline{1} & 0.\\overline{2} \\\\ \\hline \\text{Binary expansion of } f(x) & 0.\\overline{0} & 0.1 & 0.1 & 0.\\overline{01} & 0.01 & 0.11 & 0.\\overline{1} \\\\ \\hline f(x) & 0 & ½ & ½ & ⅓ & ¼ & ¾ & 1 \\end{array} $$\n\n\n • Invalid inputs fall in don't care situation. In particular, you don't need to deal with numbers outside of \\$[0,1]\\$.\n\n • Input and output must be exact rational numbers. If your language doesn't natively support rational number arithmetic, use a pair of integers.\n\n • \\$\\begingroup\\$ Input and output must be exact rational numbers. I think this implicitly bans a usage of floating-point numbers. \\$\\endgroup\\$ – Dannyu NDos Jul 24 '20 at 21:00\n • \\$\\begingroup\\$ ''If your language doesn't natively support rational number arithmetic, use a pair of integers.'' Must the pair of integers be relative prime? \\$\\endgroup\\$ – Abigail Jul 24 '20 at 21:58\n • \\$\\begingroup\\$ You may want to add some test cases that cannot be expressed as 1/x. For instance: 1/787 ~> 7/512. \\$\\endgroup\\$ – Arnauld Jul 24 '20 at 21:58\n • \\$\\begingroup\\$ I found the \"How?\" section kind-of confusing. Taken literally, going digit by digit is an endless process that doesn't terminate. As you say, the idea is to, for rationals, notice that the repeating pattern of ternary digits creates a repeating pattern of binary digits, and so creates a rational. But that's not what the written algorithm is doing. Working only with the ternary up to the repeating block of digits would make this clearer. \\$\\endgroup\\$ – xnor Jul 24 '20 at 22:01\n • 2\n \\$\\begingroup\\$ \"Bad news\": Mathematica has a built-in for this. \\$\\endgroup\\$ – user202729 Jul 25 '20 at 3:34\n\nWolfram Language (Mathematica), 15 bytes\n\n\nTry it online! Just a built-in function.\n\n\nJavaScript (ES7),  141 ... 128  125 bytes\n\nSaved 2 bytes thanks to @Ada\n\nExpects the fraction \\$p/q\\$ as (p)(q). Returns \\$P/Q\\$ as [P,Q].\n\n\nTry it online!\n\n\nTernary and binary expansions\n\nk = // build a binary string\n '0b' + ( // append the binary prefix\n n = 0, // n is a bit counter\n g = p => // g is a recursive function taking the numerator p\n (r = n - g[p]) ? // if p was already encountered, we have a repeating\n // pattern, whose length is stored in r; in that case:\n '' // stop the recursion\n : // else:\n p / q & 1 || // if p/q = 1, append a '1' and stop the recursion\n [p / q >> 1] + // otherwise, append '1' if p/q = 2 or '0' if p/q = 0\n g( // append the result of a recursive call to g:\n 3 * (p % q), // update p to 3 * (p modulo q)\n g[p] = n++ // store the position of p in g and increment n\n ) // end of recursive call\n )(p) // initial call with the numerator provided in the input\n\nTurning the binary expansion into a decimal fraction\n\nIf \\$r\\$ is NaN after the first step, it means that the binary expansion has no repeating pattern. In that case, the numerator is \\$k\\$ and the denominator is \\$2^n\\$.\n\nIf \\$r\\$ is defined, we compute the following bitmask:\n\nm = 2 ** r - 1\n\nThe numerator is:\n\n((k >> r) * m + (k & m)) * 2\n\nand the denominator is:\n\nm << n - r\n • \\$\\begingroup\\$ Can 3*(p%q) be p%q*3 for -2 bytes? \\$\\endgroup\\$ – Ada Jul 25 '20 at 14:34\n • \\$\\begingroup\\$ @Ada Indeed! Thank you. \\$\\endgroup\\$ – Arnauld Jul 25 '20 at 16:37\n\nPython 3.8 (pre-release), 120 119 117 bytes\n\n-2 bytes thanks to @Neil!\n\nf=lambda p,q,P=0,Q=1,*R:p in R and(P-P//(i:=1<[]and(x[-1]>0)+2*F(x[:-1])\".replace(\"L\",\"lambda x\")\ndef c(a,b):\n if 1in D:d=D[:D.index(1)+1];print F(d),2**len(d)\n else:print F(N)*(2**n-1)+F(R)or a,2**v*(2**n-1)\n\nTry it online! (modified to return statements for verification)\n\nTakes and returns pairs of integers (numerator, denominator). The input pair must be relatively prime.\n\nHow it works\n\nThe program separately identifies the repeating and non-repeating portions of the ternary representation of a/b, then splits into 2 cases:\n\n 1. If there is a 1 in either portion, then the numerator is (converted from binary with 21) the concatenation of the two portions up to the 1, and the denominator is 2 to the power of the length of that section\n\n 2. If there is no 1, then the number retains the repeating portion, so in base 2 (after converting 2s to 1s),\n\n $$\\frac{a}{b}=0.x_1x_2\\ldots x_k\\overline{y_1y_2\\ldots y_n}=0.\\mathbb{x}\\overline{\\mathbb{y}}$$\n\n Then $$\\frac{a}{b}=\\frac{1}{2^k}\\left(\\mathbb{x} + \\frac{1}{2^n-1}\\mathbb{y}\\right)=\\frac{(2^n-1)\\mathbb{x}+\\mathbb{y}}{(2^n-1)(2^k)}$$\n\n# Most-significant ternary digit first\nbase3 = lambda x, d: base3(x//3, d-1)+[x%3] if d else []\n# Largest exponent of a power of 3 that divides x\nv3 = lambda x: 0 if x%3 else 1+v3(x//3)\n# Base 3 representation of a/b as 0.xyz repeating, where b contains no factors of 3\ndef rep3(a,b,n=1):\n if (3**n-1)%b==0:\n return n, base3((3**n-1)*a//b,n)\n return rep3(a,b,n+1)\n\n# Base 2 to int, including converting '2's to '1's\nfrom_base2 = lambda l: eval('0b0'+''.join(map(str,l)).replace('2','1'))\n\ndef cantor(a, b):\n # Extract the non-repeating portion of the ternary expansion of a/b\n v = v3(b)\n b //= 3**v\n non_repeating = base3(a//b,v)\n # Repeating portion\n n, repeating = rep3(a%b, b)\n digs = non_repeating + repeating\n if 1 in digs:\n # Take only the part up to/including the first 1, and use it as a binary decimal\n d = digs[:digs.index(1)+1]\n return from_base2(d), 2**(len(d))\n x = from_base2(non_repeating)\n y = from_base2(repeating)\n # `or a` accounts for the a=b=1 case, which gets treated otherwise as 0.0\n return y+x*(2**n-1) or a, 2**v*(2**n-1)\n • \\$\\begingroup\\$ You don't actually guarantee to return relatively prime integers, e.g. for an input of 9,10 (the ratio is still correct). \\$\\endgroup\\$ – Neil Jul 25 '20 at 0:27\n • \\$\\begingroup\\$ @Arnauld Fixed for -10 bytes (The non-repeating portion was not padded) \\$\\endgroup\\$ – fireflame241 Jul 25 '20 at 0:35\n • \\$\\begingroup\\$ @Neil Whoops, the output is not actually relatively prime \\$\\endgroup\\$ – fireflame241 Jul 25 '20 at 0:36\n\nCharcoal, 92 77 62 bytes\n\n\nTry it online! Link is to verbose version of code. I/O is a pair of integers. Does not reduce the output to lowest terms, in particular 1 1 outputs as 2 2 as that needed fewer hacks than before, which helped to save 15 bytes. Explanation:\n\n\nInput the numerator and denominator.\n\n\nStart a list of partial remainders.\n\n\nRepeat while the current partial remainder has not been seen before.\n\n\nPush the current partial remainder to the list.\n\n\nTriple it.\n\n\nPush the next bit of the result. (Note that an input of 1 is treated as the illegal ternary 0.3 and massaged into the illegal binary 0.2.)\n\n\nGet the next partial remainder, unless the current ternary digit is 1, in which case the next partial remainder is zero.\n\n\nGet the raw binary fraction.\n\n\nAdjust it for the recurring part of the binary fraction. (In the case of a terminating fraction, this is detected a bit after the fraction terminates, effectively doubling the numerator and denominator, but the adjustment here simply halves both values again.)\n\n\nYour Answer\n\n", "pred_label": "__label__1", "pred_score_pos": 0.5018416047096252} {"content": "avatar for Sebastien Renaut\n\nSebastien Renaut\n\nScience Reproducibility and Data Archiving in Ecology and Evolution\n\nSébastien Renaut, Université de MontréalInstitut de recherche en biologie végétale, Département des Sciences biologiques, Université de Montréal, 4101 Sherbrooke Est, Montréal H1X 2B2, Canada\n\nData are the foundation of empirical research. Yet, data underlying scientific papers are often unavailable, incorrect, or poorly curated, and systematic studies on the reproducibility of results are surprisingly rare. To address this question, we gathered hundreds of datasets from either public data archives, or direct correspondence with authors, and attempted to reproduce two common statistical analyses used in biology: STRUCTURE plots using genetic data, and Discriminant Function Analyses using morphometric data. While results were encouraging and showed that a majority of simple analyses were reproducible, they highlight the fact that many studies are not the carefully curated research that the scientific community and public should expect. We also report that mandated data archiving greatly improves access to data, and come to the conclusion that data disappear rapidly as articles age. Finally, using Datadryad.org as an example, we show how data archiving has grown exponentially since 2010 and may lead to an increase in citation rates, one of the main currencies of researchers.", "pred_label": "__label__1", "pred_score_pos": 0.981378972530365} {"content": "Last modified on 9 April 2019, at 18:45\n\nOswald Spengler\n\nOswald Spengler\nBundesarchiv Bild 183-R06610, Oswald Spengler.jpg\n\nBorn May 29, 1880\nDied May 8, 1936\nMunich, Germany\n\nOswald Spengler (1880–1936) is considered by some as one of the greatest thinkers of the Weimar Republic.[1] His Der Untergang des Abendlandes, (translated as Decline of the West) (1918–22) was a very influential historical study of the cyclical nature of western civilization, that strengthened the pessimism of the 1920s. It opened the new field of comparative world history and influenced some conservative writers, but especially many nationalist authors.\n\nHe is also well known for his book Prussianism And Socialism, which argues that Prussian Socialism is the true socialism.\n\n\nSpengler was born at Blankenburg in the Harz Mountains and studied philosophy, history, mathematics, and art, taking his PhD at Halle in 1904. He taught mathematics at a gymnasium in Munich until 1911, when an inheritance allowed him to concentrate on his scholarship. Decline of the West made him an instant intellectual celebrity throughout the world in the 1920s. His other books were much less influential, and included Der Mensch und die Technik (1931; Man and Technics, 1932) and Jahre der Entscheidung (1933; Hour of Decision, 1934). Spengler spoke to the political and spiritual predicament of Germany after World War I, explaining Germany was no longer \"the people of poets and thinkers\" but could become a useful land of engineers, industrialists, and technicians. In the Weimar era he criticized parliamentary and constitutional rule, as well as individual rights, as un-German. Spengler found the Nazis' racism stupid, their economic policies shortsighted, and their \"socialism\" far removed from the old-fashioned Prussian state-capitalism Spengler intended by that name. His refusal to support Nazism led to his ostracism when the Nazis came to power in 1933.\n\n\nHis book was a smashing success among intellectuals worldwide as it predicted the disintegration of European and American civilization after a violent \"age of Caesarism,\" arguing by detailed analogies with other civilizations. It deepened the post-World War I pessimism in Europe.[2] German philosopher Ernst Cassirer explained that at the end of the First World War, Spengler's very title was enough to inflame imaginations: \"At this time many, if not most of us, had realized that something was rotten in the state of our highly prized Western civilization. Spengler's book expressed in a sharp and trenchant way this general uneasiness.\"[3] Northrop Frye argued that while every element of Spengler's thesis has been refuted a dozen times, yet it is \"one of the world's great Romantic poems\" and its leading ideas are \"as much part of our mental outlook today as the electron or the dinosaur, and in that sense we are all Spenglerians.\"[4]\n\nSpengler's pessimistic predictions about the inevitable decline of the West inspired Third World intellectuals, ranging from China and Korea to Chile, eager to identify the fall of western imperialism.[5] In Britain and America, however, Spengler's pessimism was later countered by the optimism of Arnold J. Toynbee in London, who wrote world history in the 1940s with a greater stress on religion.\n\n\nDecline of the West\n\nDecline of the West predicted the disintegration of European and American civilization after a violent \"age of Caesarism,\" arguing by detailed analogies with other civilizations and interpreting history as the life of nine organic cultures: Egyptian (3400 BC–1200 BC), Indian (1500 BC–1100 BC), Chinese (1300 BC–AD 200), Classical (1100 BC–400 BC), Byzantine (AD 300–1100), Aztec (AD 1300–1500), Arabian (AD 300–1250), Mayan (AD 600–960), and Western (AD 900–1900). Jumping across centuries and societies, Spengler adduced a remarkable variety of examples to support two key arguments. First culture is a fundamentally spiritual or ideal phenomenon; studying its history allows us to grasp its temporal character, its principle of becoming—of the world-as-history. It is this ideational or spiritual quality that authoritatively distinguished it from other Cultures. Using his strong background in art history and mathematics, Spengler sought to understand the unique \"soul\" or pattern of experience and creation of each civilization by comparing its forms of art, thought, and action. Thus the Western or \"Faustian\" soul is characterized by a yearning for infinity, which is equally expressed in the Gothic cathedral, the infinitesimal calculus, the music of Bach, worldwide imperialistic diplomacy, the radio, and modern techniques of credit banking.\n\nSecond, all cultures follow the same sequence of growth and decay in similar lengths of time. They pass through the stages of pre-culture, culture, and civilization, and are marked by identical crises. Alexander the Great, for example, plays the same role in Classical culture as Napoleon in Western culture; Pythagoras resembles Martin Luther; Aristotle parallels Immanuel Kant; Stoicism in Rome is like Socialism in Germany. Given that every culture passes a life cycle from youth through maturity and old age to death, it follows that Western civilization has now entered the final period of inevitable decline. More precisely, he identified the two stages of culture and civilization, and equated the second stage with degeneration. Spengler views the first decline of the West as applying to all cultural achievements and occurring with the transition from the first to the second stage during the 19th century, amid the prevalence of materialist and democratic values, and anticipates a second future decline with the victory of a growing mass of \"coloreds\" over a declining minority of \"whites,\" or \"Prussians,\" who as the potential elite of Western civilization at the political level would defend and preserve the remnants of its culture, although no change is envisaged in other cultural spheres.\n\n\nFor a more detailed treatment, see Prussianism And Socialism.\n\nIn his 1919 book Prussianism And Socialism, Oswald argued that German Socialism, which he called \"Prussianism\", was the true form of socialism. He compared this with Marxist socialism, which he believed to be too English in origin.[6]\n\n\nHis many striking aphorisms include:\n\n • A civilization (Kultur) is born at the moment when, out of the primitive psychic conditions of a perpetually infantile [raw] humanity, a mighty soul awakes and extricates itself: a form out of the formless, a bounded and transitory existence out of the boundless and persistent. This soul comes to flower on the soil of a country with precise boundaries, to which it remains attached like a plant. Conversely a civilization dies if once this soul has realized the complete sum of its possibilities in the shape of peoples, languages, creeds, arts, states, and sciences, and thereupon goes back into the primitive psyche from which it originally emerged.[7]\n • We are civilized people, not Gothic or Rococo people; we must reckon with the hard cold facts of life in a late era, to which the parallel is not Pericles' Athens but Caesar's Rome. Of great painting or great music there can no longer be, for Western people, any question. Their architectural possibilities have been exhausted these hundred years. Only extensive possibilities are left to them. Yet, for a sound and vigorous generation that is filled with unlimited hopes, I fail to see that it is any disadvantage to discover in time that some of those hopes must come to nothing. And if the hopes thus doomed should be those most dear, well, a man who is worth anything will get over that. It is true that the issue may be a tragic one for some individuals who in their decisive years are smitten by the discovery that in the spheres of architecture, drama, painting, there is nothing left for them to achieve. What matter if they do go under!... If under the influence of this book men of the coming generation devote themselves to technics instead of lyrics, to the navy instead of painting, to politics instead of philosophy, they will be doing what I wish, and you could not wish anything better for them.[8]\n\nWe are socialists. Let us hope that it will not have been in vain.[12]\n\n\n • Bentley, Jerry H. Shapes of World History in Twentieth Century Scholarship. Essays on Global and Comparative History Series. (1996)\n • Hughes, H. Stuart. Oswald Spengler (1952).\n • McInnes, Neil. \"The Great Doomsayer: Oswald Spengler Reconsidered.\" National Interest 1997 (48): 65-76. Issn: 0884-9382 Fulltext: Ebsco\n\nPrimary sources\n\nSee also\n\n\n 1. Spengler’s Prussian Socialism\n 2. Wyndham Lewis, Time and Western Man (1927)\n 3. Ernst Cassirer, The Myth of the State (1946) online at p. 289\n 4. Northrop Frye, \"Spengler Revisited\" in Northrop Frye on modern culture (2003) online at p. 305\n 5. Prasenjit Duara, \"The Discourse of Civilization and Pan-Asianism.\" Journal of World History 2001 12(1): 99-130. Issn: 1045-6007 Fulltext: Project Muse; Neil McInnes, \"The Great Doomsayer: Oswald Spengler Reconsidered.\" National Interest 1997 (48): 65-76. Fulltext: Ebsco\n 6. German Socialism as an Alternative to Marxism\n 7. Decline of the West 1:153\n 8. Decline of the West 1:40 online\n 9. The Decline of the West, vol. 1:32 online\n 10. The Decline of the West, vol. 2, ch. 4, sect. 3\n 11. The Decline of the West, vol. 2, ch. 4, sct. 5\n 12. Prussianism And Socialism, Conclusion", "pred_label": "__label__1", "pred_score_pos": 0.7247155904769897} {"content": "\n\n\nThis method of streaming bypasses cable, broadcast and satellite television platforms that have traditionally acted as a controller or distributor of such content. It also contrasts with other methods of purchasing or renting video content from an Internet Service Provider (ISP), such as pay television, video-on-demand or otherwise. With this recontoured method of delivery increasing consumption substantially, network architecture must pivot to deploy services beyond traditional cable and satellite television networks. If an enterprise’s network cannot deliver adequate capacity, end user experience will be compromised (resulting in poor quality playbacks, buffering, pixelation, etc.), customers will jump ship for a different provider and companies’ bottom lines will suffer. \n\nTo support new sky-high bandwidth demand, telecom companies are using scalable cloud computing resources that support geo-redundant high availability over public internet infrastructure. This strategy provides the flexibility and availability required to support video streaming. Network providers can also increase network bandwidth with equipment upgrades, such as deploying distributed video edge caching strategies or building out virtualized or software-defined implementations.  \n\nAs networks evolve, the industry is seeing that this growth of streaming aligns with the push toward the edge. While data can traverse great distances almost instantaneously, even high-end fiber optic cable is constrained by the laws of physics. Consequently, the location of the data center matters even more when consumer content is involved. To solve issues of latency, quality and capacity, moving data and content closer to the end users with a distributed data center strategy is becoming a key to success. Strategic location can cut down on latency, reducing the time it takes a piece of data to physically travel from its source to the end user.\n\nThere’s no question that streaming is permanently altering the foundations of the telecommunications industry. As a result, a sense of urgency is arising as demands grow and network solutions are needed now to keep consumers happy into the future. As the industry heads into an era where OTT content is a cornerstone, network topologies and build strategies will continue to evolve and spread to ensure seamless coverage and capacity.", "pred_label": "__label__1", "pred_score_pos": 0.9702011942863464} {"content": "Generating low-pressure shock waves for calibrating high-frequency pressure sensors\n\nDennis C Berridge, Purdue University\n\n\nMeasurements of hypersonic boundary-layer instabilities have recently been performed in a wide range of wind tunnels with fast-response pressure transducers. In order to achieve accurate amplitude measurements, the calibration and frequency response of the sensors must be understood. Hypersonic instabilities are high-frequency, low-amplitude waves, so relevant calibrations must use similar inputs. This is particularly important for the PCB-132 sensors which have been widely used to measure hypersonic boundary-layer instabilities despite the lack of low-amplitude calibrations or frequency response information. This work demonstrates the creation of extremely low-amplitude shock waves in a shock tube, which can be used to calibrate sensors for instability measurements. The shocks are created using weak diaphragms and low driven pressures on the order of 1 millitorr. A method for automatically measuring the shock arrival time and amplitude was developed. The method uses a rising-edge detector, a minimum peak-width criterion, and a simple low-pass filter to detect small shock waves in traces with low signal-to-noise ratio. Shock amplitudes as low as 0.001 psi are demonstrated. The flow is shown to agree with theoretical expectations within the existing uncertainties. Calibrations of PCB-132 sensors were performed between 0.001 and 1 psi. The sensors were found to have a linear calibration over the entire range within the sensor uncertainty. Step responses were measured for PCB-132 and Kulite sensors. The PCB-132 step responses are complicated and vary between sensors, but they are repeatable. They normalize well with the maximum peak voltage, demonstrating that the sensors are a linear system.\n\n\n\n\nSchneider, Purdue University.\n\nSubject Area\n\nAerospace engineering\n\nOff-Campus Purdue Users:\nTo access this dissertation, please log in to our\nproxy server", "pred_label": "__label__1", "pred_score_pos": 0.657356321811676} {"content": "Why Is HRD Important In HRM?\n\nWhat are the features of HRD?\n\nFeatures of HRD:Systematic approach: HRD is a systematic and planned approach through which the efficiency of employees is improved.\n\nContinuous process: ADVERTISEMENTS: …\n\nMulti-disciplinary subject: …\n\nAll-pervasive: …\n\nTechniques: …\n\nEquity: …\n\nEmployability: …\n\n\nWhat is the definition of human resources?\n\n\nWhat is human resource development Wikipedia?\n\nFrom Wikipedia, the free encyclopedia. National human resource development (NHRD also known as human resources development) is the planned and coordinated process of enhancing human resources in one or more political states or geographic regions for economic and/or social purposes.\n\nWhat are the steps involved in HRD process?\n\nThe Assessment in the HRD Framework involves prioritizing the need, understanding and examining the performance of the employees, job tasks and organizational environment. … Assessment is the first step that requires identifying the specific skill-set requirement as per the job performance.\n\nWhat is difference between HRM and HRD?\n\nThe human resource management [HRM] is mainly maintenance oriented whereas human resource development [HRD] is development oriented. … Human resource management [HRM] mainly aims to improve the efficiency of the employees whereas [HRD] aims at the development of the employees as well as organization as a whole.\n\nWhat are the importance of human resources planning?\n\nHuman resource planning enables businesses to meet their current and future demands for talent, allowing human resource managers to anticipate and develop the skills most valuable to an organization, and providing the enterprise with the optimal balance of staff in terms of available skill-sets and numbers of personnel …\n\nWhat are the outcomes of HRD?\n\nHRD Outcomes HRD outcomes provide the ground rules to build an organization excelling in people, processes, products and profits. Outcomes : • Training makes people more competent. They develop new skills, knowledge and attitudes. There is greater clarity of norms and standards.\n\nWhat is the purpose of HRD?\n\nHuman resources development (HRD) refers to the vast field of training and development provided by organizations to increase the knowledge, skills, education, and abilities of their employees.\n\nWhy is National HRD important?\n\nThe impact of national HRD: To research the role of government in implementing HRD policies in western nations. For developing countries, the role of government and other organizations in training and developing their huge workforces.\n\nWhat are the HRD process?\n\n\nWhat is HRD process model?\n\n2 A Framework for the HRD Process HRD efforts should use the following four phases (or stages): Needs assessment Design Implementation Evaluation. 3 Training & HRD Process Model. 4 Needs Assessment Phase Establishing HRD priorities Defining specific training and objectives Establishing evaluation criteria.\n\nWhat are the 7 functions of HR?\n\n\nWhat is HRD PPT?\n\nDefinition of HRD• A set of systematic and planned activitiesdesigned by an organization to provide itsmembers with the necessary skills to meetcurrent and future job demands. …\n\nWhat is HRD in HRM?\n\nHuman Resource Development (HRD) is a series of organised activities, conducted within a specialised time and designed to produce positive behavioural changes. … Specifically, BusinessDictionary defines HRD as ‘the part of human resource management that specifically deals with training and development of the employees.\n\nHow does human resource development help the nation?\n\nHuman resources development is important because it is an investment in one’s employees that will ultimately result in a stronger and more effective workforce. When an organization develops their employees, they are strengthening their assets and making these employees even more valuable.", "pred_label": "__label__1", "pred_score_pos": 0.9983502626419067} {"content": "Please try rebooting the app:\n\n1. Open the Google Play Store on your device and check that you are logged in to the account that is paying the subscription:\n\n2. Swipe up to reveal the shortcuts and tap the square then select Joy of Reading and close it.\n\n3. Reopen the app, the content should start downloading.", "pred_label": "__label__1", "pred_score_pos": 0.9102931022644043} {"content": "Brain Injury\n\n\nBrain injury can occur in many ways. Traumatic brain injuries typically result from accidents in which the head strikes an object. This is the most common type of traumatic brain injury. However, other brain injuries, such as those caused by insufficient oxygen, poisoning, stroke, or infection, can cause similar deficits.\n\nMild Traumatic Brain Injury (MTBI) is characterized by one or more of the following symptoms: a brief loss (or no loss) of consciousness, loss of memory immediately before or after the injury, any alteration in mental state at the time of the accident, or focal neurological deficits. In many MTBI cases, the person seems fine on the surface, yet continues to endure chronic functional problems. Some people suffer long-term effects of MTBI, known as postconcussion syndrome (PCS). Persons suffering from PCS can experience significant changes in cognition and personality.\n\nMost traumatic brain injuries result in widespread damage to the brain because the brain ricochets inside the skull (coup-contrecoup)1 during the impact of an accident. Diffuse axonal injury2 occurs when the nerve cells are torn from one another. Localized damage also occurs when the brain bounces against the skull. The brain stem, frontal lobe, and temporal lobes are particularly vulnerable to this because of their location near bony protrusions.\n\n\nTag:Acute care, healthcare, rehab, brain injury, health care,Nursing Facility Physician , Skilled Nursing Facility, nursing home, Therapy, Chino,Congregate home", "pred_label": "__label__1", "pred_score_pos": 0.9927770495414734} {"content": "Quick Answer: How Do You Fix Anemia?\n\nWhat causes a person to become anemic?\n\nThere are three main reasons people become anemic: blood loss, a reduction in the body’s ability to produce new red blood cells, or an illness that leads to increased destruction of red blood cells.\n\nBlood loss.\n\nExternal bleeding from surgery or trauma also can cause anemia..\n\nHow long does it take to recover from anemia?\n\n\nWhat drink is high in iron?\n\n\nWhat are the three main causes of anemia?\n\nCauses of anemiaIron deficiency anemia. This most common type of anemia is caused by a shortage of iron in your body. … Vitamin deficiency anemia. … Anemia of inflammation. … Aplastic anemia. … Anemias associated with bone marrow disease. … Hemolytic anemias. … Sickle cell anemia.\n\nWhat fruit is high in iron?\n\n\nWhat is the fastest way to cure anemia?\n\nHere Are Some Natural Remedies for Anemia You Can TryAdequate doses of Vitamin C can help fortify you from within. … Yogurt helps manage anemia naturally. … The high amounts of chlorophyll contained in green vegetables is a good source of iron. … Beetroots are rich in folic acid.More items…•\n\nHow can I tell if Im anemic?\n\n\nDoes sleep help anemia?\n\nEat a healthy diet with lots of iron-rich foods (like beef, liver, canned salmon, dried fruits and fortified cereals). Drink lots of fluids. Sleep more at night and take naps during the day. Plan your day to include rest periods.\n\nIs coffee high in iron?\n\nSeveral studies have found that coffee and other caffeinated drinks can reduce iron absorption. One study found that drinking a cup of coffee with a hamburger meal reduced iron absorption by 39%. … Furthermore, regular coffee consumption may also have an effect on iron storage levels.\n\nCan Anemia Be Cured?\n\nIn all types of anemia, blood transfusions can help replace your lost or defective red blood cells and reduce symptoms. … In this procedure, your bone marrow is replaced with donor marrow that can make healthy cells. This is the only cure for some type of anemia, such as paroxysmal nocturnal hemoglobinuria.\n\nHow serious is being anemic?\n\n\nWhat foods should you avoid if you have anemia?\n\n\nAre Bananas high in iron?\n\n\nIs milk good for anemia?\n\nMilk has some good qualities (protein, calcium, vitamin D, etc.) However, milk and milk substitutes (like soy milk) are not good for children with iron deficiency anemia for a number of reasons. … Cow’s milk can cause intestines to lose small amounts of blood. When blood is lost, iron is lost with it.\n\nWhat is considered severe anemia?\n\nAnemia is classified as mild, moderate, or severe based on the concentrations of hemoglobin in the blood. … For all of the tested groups, moderate anemia corresponds to a level of 7.0-9.9 g/dl, while severe anemia corresponds to a level less than 7.0 g/dl.", "pred_label": "__label__1", "pred_score_pos": 0.9802466630935669} {"content": "World war 1 essay conclusion for aqa biology coursework help\n\nWorld war 1 essay conclusion\n\nThe announcement came a month on the canvas. Einsteins theory of the corkscrew. Ma fait cadeau aussi, dune photographic, durantys periodical realisme was published bution of books like robert hookes famous in art circles in which the axis of rotation. Accommodation in the future of tesla [lo ] how to define systems and structures set up india japan open sky agreement was signed in order for their own cultur they too will tell whether gase can control the dissemina tion of art, s. M. Ratz. Ycy] omet self portrait, taken probably in for a technology investors and obtaining needed financing, parish builds the credibility for the male artists in tentions is not something is art, we participate in this book is available for free at cnx. I do not match the nutrients they provid ceos on down. Reviewing the already narrow gap between rich and relevant in the chart, edmond and jules de goncourt. Particularly jobs associated with a spring in shm, ezra pound and maison sur la colline was no longer hunger to devastate others for a pittanc in this country. For example, a loan of nique of photographing both the change in, folk traditions. In our increasingly global economy, managers must coordinate engineering with a high level in decibels for a pension to the college of the rods elongation, using m. From the late s and can be obtained by trad the wife of the. And she knows her soccer team is a component greater, quick service and to the places of paris in saint gallen and hamburg. He put some soil and water, if both the quantity dm is again worth noting that there is another example of this proposal, the board of directors idp education as a number that multiplies a unit vector of the most and are connected to newtons third law are such crucial activities, courses and future success depends on the photographic I am agine that our relationships I am.\n\napa format for outline research papers   ap world history compare and contrast essay thesis example  \n\nA rose for emily thesis statement\n\nAnd heresies was born in to the question of motion for a more complex is the excitement over the long run, we take reaction to that country and the feminist art publication. The structure and culture attitudes ethics in action digging deep to promote geographical indications cipam, which works for one or more people start to see them and the angular momentum of the integral, which determines the validity of the. An interesting aspect of female workers, the researchers into eight product divisions to obtain after. During the s and t is the starting line of nonstick coated frying pans. Fiedlers contingency model fred fiedler was among those artists and audiences take seriously the ways she presented turkish women. J, what are some potential increases. asian tsunami case study  \n\nInclude the following figure, given that it can co opt resistance to falling in a space station, where there were still largely considered to be the time of lysippus, who ridiculed other sculptors for making one object but a mentor is an I am trying to define its business focus. Although almost the entire time it can measure echo times for complex emotions, fear, trauma, et when people acknowledge cases of putative art objects. The job characteristics model r. Hackman and oldham argue that this choice makes the potential energy, and reduced profits. Kg in s, klee spoke of pure aes thetic valu the solar day is this minimalism that is clear cut so that one or more divisions that compete in to to pay reasonable compensation for services rendered and to become strong enough to inform customers about the unit vector of length cm is zero. The jobs they are made set of necessary and jointly sufficient conditions for the angular momentum in two and three dimensions magnitude of a disk that is used in the next task is to identify opportunities and challenges we face a dilemma, clearly. In a managers challenge, tend the attainment of organizational goals efficiently.\n\na level history coursework edexcel   absence of malice essay t filmbay 4 cinema studies html   i cant do my maths homework\n\nCivil engineering essays\n\ndoing homework before class and world war 1 essay conclusion\n\nConcluding this clever argument, m. Marie asked that photographys rights of the building of bureau of labor and world war 1 essay conclusion indistinguishable from photo graphy with other material begins to accelerate at. And selection needs analysis planning chapter twelve making many decisions or if you are experiencing a taste for appropriating otherness by annexing tribal objects to which photography was still less flexible and rethinking how we as aestheticians can fulfill either responsibility with out energy, john d. Rockefeller was born. Initially, the school administrators to I am pulse on a photograph. Harry minter, linkedin, opportunities, erac enterprise rent a car model, and every step, for each other to cheat, how long we beat around the hoop. Ranked # in math the number of disjunctive conditions, and he showed an aptitude for financ he earned money doing o jobs and the direction opposite offeet on wal figur when two organizations share the groups and teams and innovation then returning to pollinate the multiverse is our first two years ago and its thorns. Html, may. Selecting and designing organizational structure in which novitz takes to be contrasted with the radius vector. With the constant comparative method. And an artist deliberately withholds a work of george moser, a swiss enameler who was fired with a force nmy I nmx j figur calculate the I am pressionism who in aition to subjective appraisals, some organizations have some direct. What can there be a source of considerable interest in math skills and the cinema do from june to may. Novartis pharmaceuticals answers, eeo gov, june, whats holding women back. It was often on the spring is level with each other to paint rosy pictures of paris graphy. But this would render a significant number of molecules that make it better. Read the email challeng the following littles article in the motion of an object of mass communication media, including face to face with the chicago based nonprofit, collaborative for academic achievement standards that all planetary orbits were circular. Cmd of mecl signed the treaty would strengthen india japan act east forum, santosh sharma. The aids coalition to unleash power act up, also founded in which ships were allowed admittance to meeting the needs at more than million members and contractors who will communicate using voice and video over the specified interva so here, that t cos mg cos ma cm x, or a pure I am proved management continue to make sure they stay within budgetsthat indicate whether their response satisfies written instructions that are approved or sanctioned in that only men had the same time, the general lack of an incompressible fluid in static equilibrium and elasticity figur nelsons column under construction. A large number of families, households, and children in a western one that is in its creation as a function of geometry to construct resultant vectors, followed by an existing public school teachers and other health professionals to exhibit, but where. And that likes could help defeat islamic show a gradual bottom up develop a new and unconventional means of collecting studies of nature to be committed to exposing the reality of industrializing russia led them to obtain a kx, b what is involved in sales campaigns that use the secret hien shadow baggage of ancient classic. Jun sun at a fine invention, html. Austria, orgcontentco chapter work and kinetic energy was lost in the salon of also published in in salzburg. T. Levitt, the globalization of business cesses and thus are subject to sanctions.\n\nessay on yellow journalism in pakistan   a business plan is important  \n\nExample of evaluation research paper and world war 1 essay conclusion\n\nIn the conclusion essay 1 war world morning, open their mail, or look at the both owens and s. Thurm, slump prods. [lo ]. Describe the responsibilities of people have knowledge of the tractor and cart a has length. But ourselves, who else. Divyang sarathi this mobile application launched by chief minister virbhadra singh inaugurated first phase of the special education and how the water enters at a speed of light her the string is attached by a pickup truck has more mass distributed away from the combustion of fossil fuels is the drag force is proportional to the narrow range of creative photography. Programming, modeling, simulation, queuing theory, and david tudor, she became free without the drama is so great a man ager for global corporations and local topography, lets use equation. Managers should always reach first to study with the first will be a potential linkedin at about kmh in still air, instead of relying on verbal communication. In, around. Better built could manufacture them in a list of all the same protection as the basis of intuition. For example, a ping pong ball and with each other, their standing a complicated score based on the child as a culture in japan and the course of western naval command on long held assumption. Listen a listen and complete the graphic arts than that enjoyed by most members of all participants have an extended rigid body oscillates between and, carrs strong, brooding paintings of the basin equals energy at. Overhaul of the ielts academic writing task essay questions official open access online marking rubrics. Top managers have formulated the definition in part involves consenting tos ait status.\n\nessay writing service sites   application for a job sample letter", "pred_label": "__label__1", "pred_score_pos": 0.6280969381332397} {"content": "the howitzer culture\n\nWe are an american company with over 20+ years of expertise in design and clothing manufacturing. our mission is to provide premium clothing highlighted by original designs of the highest quality, with a brand mission to provide charitable donations to the american heroes we respect.\n\nproduct design\n\nThe Howitzer Team only releases products that we are proud of by always striving to make better designed and higher quality garments. all of our products are proudly designed in the usa by our team of american patriots. we meticulously hand draw each unique piece of art and we take great pride in ensuring our artwork is industry leading.\n\nour passion for the garments we make is our driving force to continuously innovate our products. we source the finest materials and techniques that seamlessly integrate into your patriotic lifestyle. we continue to sharpen our skills through constant feedback from our team of ambassadors, operators, and patriots in the field. Their continued testing of our durability, quality, and design help us ensure we are making a garment worth purchasing.\n\nCustomer Satisfaction\n\ncustomer satisfaction is key to our business and we strive to build lifelong fans. howitzer is grateful for the opportunity through our customers support to show respect and honor to the brave american heroes that selflessly sacrifice for us all!\n\nunited we stand, divided we fall.", "pred_label": "__label__1", "pred_score_pos": 0.9115914106369019} {"content": "Bill Text: WY SF0027 | 2021 | Regular Session | Introduced\n\nBill Title: Essential health product dignity act.\n\nSpectrum: Committee Bill\n\nStatus: (Introduced) 2021-01-12 - Introduced and Referred to S03 - Revenue [SF0027 Detail]\n\nDownload: Wyoming-2021-SF0027-Introduced.pdf", "pred_label": "__label__1", "pred_score_pos": 0.8655447959899902} {"content": "Do you think Noam Chomsky would get any answers in this forum, or would his questions be closed by moderators as off-topic, because they have more to do with math and computer science than with linguistics?\n\n • 4\n I don't think I've ever gotten to use the \"migrate to Meta\" close reason before! – Draconis Mar 2 '20 at 17:35\n • It was not a formal mathematical question, but rather a general inquiry about the technique, pioneered by Chomsky, being used beyond linguistics. – Vadim Mar 2 '20 at 17:55\n • 2\n @Atamiri: That is a bit unnecessary. I'm no mathematician, but I do have some background in mathematics. That doesn't have anything to do with my votes to close those questions, which are based only on the fact that they do not deal with natural language. – WavesWashSands Mar 2 '20 at 18:02\n • 1\n @Vadim: For us plebs, we're only allowed to vote to migrate to meta (there may have been an option to migrate to ELL / ELU before, or maybe not - it might be a false memory of mine). I think lemontree used some of her mod powers (that most of us don't have) when she moved one of the formal semantics person's questions to Philosophy. – WavesWashSands Mar 2 '20 at 18:04\n • 1\n @Vadim I think it’s quite logical that questions beyond the scope of linguistics get closed/moved. Your question about CFG was actually really interesting and you provided one nice example yourself (from biology), but it really belonged to another forum (probably CS or AI). – Atamiri Mar 2 '20 at 18:08\n • 1\n @WavesWashSands The problem is there’s no forum on this site to ask questions about computational/mathematical linguistics. Many relevant questions get closed or receive poor/irrelevant answers. – Atamiri Mar 2 '20 at 18:12\n • @Atamiri: I agree that comp questions don't get as many good answers, though they might still get better answers on Cross Validated, AI or Data Science. I don't recall many good questions being simply closed though; sometimes people will be close vote-happy, but it usually doesn't get to the required five for actual closing. (Of course our experiences may well be different, since there are times when I'm active on the site and you aren't, and likely vice versa as well.) – WavesWashSands Mar 2 '20 at 18:21\n • 1\n @WavesWashSands There wasn't an option to migrate to ELU before, as far as I know—beta sites only get migration paths to their respective metas. We've graduated now, but still don't get the full suite of migration options yet. See linguistics.meta.stackexchange.com/a/1857/10559 – Draconis Mar 2 '20 at 18:28\n • 2\n @Vadim It's not about a lack of intellectual curiosity, it's about this site having a specific scope, by design. That's just how StackExchange works. – Draconis Mar 2 '20 at 18:29\n • The narrowness of moderators in preventing people from asking about what interests them is pretty hard to take. I don't see why anyone should denied the opportunity to ask. Whose interest does that serve? Linguists'? I don't think so. I have never downvoted a question, and I never will. – Greg Lee Mar 2 '20 at 18:30\n • 1\n @Draconis many interesting questions are interdisciplinary ones. – Vadim Mar 2 '20 at 18:33\n • 3\n @Vadim: The thing is, unfortunately, that your question didn't really have much to do with linguistics itself. Context-free grammars are not part of linguistics per se; they are only relevant insofar as they are applied to natural language. It's a bit like the relationship between calculus and physics; calculus was developed with physical motivations in mind, but I don't think the physics SE would accept a question about non-physical applications of calc. – WavesWashSands Mar 2 '20 at 18:41\n • 2\n @Vadim: If I may ask, what would be your basis for thinking that this forum is more parochial than CV? I've looked up your questions on CV, and they're all are pretty clearly on-topic. – WavesWashSands Mar 2 '20 at 22:34\n • 2\n @Atamiri: I'm all for interdisciplinarity, coming from an interdisciplinary background myself. But I don't think that should come at the cost of our focus on the empirical study of natural languages. There are many interesting for interdisciplinary collaboration that can be and are explored, without abandoning natural language as the main focus or at least one of the main foci. But I don't see how accepting questions that are explicitly not about natural language will be beneficial to our community. – WavesWashSands Mar 2 '20 at 22:47\n • 2\n @Vadim: Those are not really comparable though. There are a lot more people studying and applying stats and ML than linguistics, so of course CV is going to have way more activity. I believe CV closes low-effort 'do my homework' questions as well, just as we do, although questions that show effort, have a specific question and aren't duplicates remain up, which is the same policy as for here. OTOH, R programming questions that belong on SO aren't allowed on CV, even if they're relevant to a computational statistics audience and the question would likely be answerable by CV users. – WavesWashSands Mar 3 '20 at 9:21\n\nWhat a ridiculous thing to ask. If Noam Chomsky came here and asked a clear and focused question about linguistics, of course he'd get answers.\n\nBut if he asked a question about politics or computer science, then the questions would be closed, as it would be if anyone else asked it.\n\n • 1\n I guess that in the 50s there were plenty of people who told Chomsky that math and logic had nothing to do with linguistics. In fact, the history of science has quite a few examples when breakthrough papers were not published in leading journals, because they were off-subject. – Vadim Mar 2 '20 at 21:57\n • 2\n That may be true, but your situation is not remotely like his. – curiousdannii Mar 2 '20 at 21:58\n • You never know who you may run into in SE, don't you? :D – Vadim Mar 2 '20 at 22:18\n • 2\n I don't know where this is coming from, but in fact the 1950s was the golden era of people (including Chomsky and his mentor Harris) saying that math and logic had everything to do with syntax and semantics. And Chomsky's Syntactic Structures (1957) was a runaway best-seller. I don't think he was oppressed much at the time. – jlawler Mar 2 '20 at 23:31\n\nChomsky would not ask any questions here, so the question has an invalid presupposition. Indeed, I cannot discern what the \"real\" underlying question is. I suppose it might be \"if we had users who were experts in their field, would they ask technical questions in their field here?\". Or, \"to what extent is SE a useful form for top-tier experts in an area to gain further knowledge of their field?\" is a possible question – though it's going to be answered purely with personal opinion.\n\nAnother question you might ask is \"what should the intended audience of SE be?\". A third question is \"why should the dissemination of knowledge via SE be limited to well-defined questions that have definite answers; why do we not have a provision for open-ended serial discussions?\". Or, \"how is SE different from Redit?\". Finally, you could ask \"what function does closing, deleting, editing and voting serve: should these functions be disabled (what would be the consequence of doing so, what are the arguments for and against doing so)?\".\n\nA further question, directed to a specific point you raise, is \"Should SE eliminate the diamond hammer?\". I am not totally unsympathetic to that proposition, but that would be a pretty brutally Darwinian burden on smaller SEs. \"Best practice\" is for moderators to wait on VTC until there are already 4 votes to close.\n\n • 2\n I was talking about Chomsky in 50s. The premise was that some of the SE forums discourage interdisciplinary questions. E.g., formal grammars were extensively developed within linguistics - even the computer science books obediently cite Chomsky and his hierarchy. So a curious linguist may well wonder about other uses of his/her favorite methods (curious about formalism, historical aspects or simply the impact of his field). And it is natural to address this questions to other linguists who have probably posed it themselves. Yet, such question would be judged off-topic. – Vadim Mar 2 '20 at 20:31\n • 6\n Just because Chomsky wrote something doesn't mean it's related to linguistics. Chomsky has written about many non-linguistic topics, including computer science, philosophy, politics, etc. In fact, arguably almost none of his writings in the past thirty years are relevant to linguistics. It's totally possible (and common) for people to write outside the fields they primarily affiliate with; Gell-Mann, for example, has written a linguistics paper that you probably would not classify as physics. – WavesWashSands Mar 2 '20 at 22:00\n • It is not uncommon for physics journals to publish non-physics papers. Los Alamos arXiv began as a physics collection and branched much later, to accommodate growing amount of non-physics material. – Vadim Mar 2 '20 at 22:21\n • 2\n Sure, but we're talking about SE sites, not journals. I've seen linguistics papers in statistics journals like JRSS(C) as well, though they would of course have to be heavy in statistical content, and not just showing ANOVAs. – WavesWashSands Mar 2 '20 at 22:22\n\nYou must log in to answer this question.\n\nNot the answer you're looking for? Browse other questions tagged .", "pred_label": "__label__1", "pred_score_pos": 0.771213710308075} {"content": "\n\nMick Tsikas/AAP\n\nMark Kenny, Australian National University\n\nThrough recent natural disasters, global upheavals and a pandemic, Australia’s political centre has largely held.\n\nAustralians may have disagreed at times, but they have also kept faith with governmental norms, eschewing the false allure of populism beguiling voters elsewhere.\n\nRead more:\n\nOur federal and state governments enjoy broad public confidence and draw their core legitimacy from the middle ground, whether it be centre-left or centre-right.\n\nBut if Australians followed the 2020 presidential race in the United States with greater-than-usual interest, it was because when boiled down, it presaged a plausible descent for Australia’s politics, too.\n\nTwo very different futures\n\nLast November’s poll offered a choice between two fundamentally different futures for the US.\n\nPro-Trump protesters at the US Capitol in January 2021.\nThe recent US election showed a deeply divided United States.\nMichael Reynolds/AAP\n\nOn the one hand, there was an assumption that free and fair elections, the rule of law and concepts such as pluralism and civility are central to government and society.\n\nOn the other, there was an angry, polarising disintegration, in which rules can be broken, facts undermined, critics abused and the usual accountability mechanisms silenced.\n\nAs a partner democracy with deep cultural, economic, and strategic ties with the US, Australians lapped up the theatre of the Trump versus Biden contest. But many also worried the verdict of America’s 150 million-plus voters would have material implications down under.\n\nRead more:\n\nStrategically, these implications included a continuation of the US global retreat, which had already seen China moving to fill the leadership void.\n\nDomestically, it might involve the insidious adoption of Trumpist methodology within Australia’s political right.\n\nTrumpist approach already here\n\nManifestations of the latter are already advanced in sections of our news media, and the willingness of political leaders to bluster through mistakes and exposed wrongdoings, refusing to apologise, explain or resign.\n\nThis is a key take-out of the Trump approach: notions of honour and tradition, long relied upon to protect probity and avoid conflicts of interest, can be ignored. Those seeking transparency or who uncover maladministration can be depicted as political opponents or extremists, motivated by hatred and prejudice.\n\nFor the Westminster tradition, where confidence rests on protections only ever partly codified, the dangers are existential.\n\nWhat mistakes?\n\nEvidence of this deterioration can be seen in the marked tendency of governments to stare down calls for resignation, ignore significant public disquiet, and press on.\n\nIn 2020, NSW Premier Gladys Berejiklian admitted an intimate association dating back years with a disgraced former MP who, it turned out, had been arranging property deals for commission, even as a backbencher.\n\nNSW Premier Gladys Berejiklian\nNSW Premier Gladys Berejiklian refused to quit during the scandal over her relationship with former MP Daryl Maguire.\nDan Himbrechts/AAP\n\nBerejiklian’s defence amounted to a blunt “I’ve done nothing wrong”.\n\nThe origin of forged documents, released by federal Energy Minister Angus Taylor to defame the Sydney City Council, has never been properly explained.\n\nRead more:\nWhy can politicians so easily dodge accountability for their mistakes? The troubling answer: because they can\n\nExplosive revelations of political interference in a A$100 million federal sports grants program have never been conceded (although, Berejiklian recently admitted “political” allocation is standard practice when forced to explain similar outrages in a state program).\n\nThere is also the A$30 million Leppington Triangle land purchase which benefited a political donor, but brought no resignation. And the Robodebt debacle, which caused massive community suffering and cost taxpayers hundreds of millions of dollars, but cost nobody their job.\n\nContrast this with the response in The Netherlands where the entire cabinet, including Prime Minister Mark Rutte, resigned on Friday. This was over a scandal involving child welfare payments, which had led to parents erroneously being labelled fraudsters.\n\nAs Rutte explained,\n\n\nThe two scandals are remarkably similar in nature, and in the scale of the taxpayer-funded recompense, but could scarcely be more different in the level of political responsibility taken.\n\nIt used to be very different\n\nPreviously, ministers have resigned over comparatively technical breaches. This includes the unwitting importation of a Paddington teddy bear in the 1984 case of Labor’s Mick Young – the bear, which would have attracted an import duty measured in cents, was actually in his wife’s luggage.\n\nA Berejiklian predecessor, Barry O’Farrell, quit in 2014 after advising the Independent Commission Against Corruption he had no recollection of receiving a single – albeit valuable – bottle of wine. Announcing his resignation, he said,\n\n\nFormer NSW premier Barry O'Farrell in the back seat of a car.\nFormer NSW premier Barry O’Farrell resigned after a ‘massive memory fail’ about a bottle of Grange.\nDan Himbrechts/AAP\n\nThe army minister Andrew Peacock offered to resign in 1970 after his wife appeared in an advertisement for Sheridan sheets. A few years later, two Fraser government ministers fell on their swords over a colour TV carried into the country but declared as black-and-white on a customs form.\n\nThe threshold has changed\n\nThe mere appearance of wrongdoing used to be enough to raise public confidence problems and thus end a ministerial career. Now, even the substance of dishonesty, non-disclosure or incompetence avoids meaningful sanction.\n\nThe right-wing extremism that informs Trump’s base has become all pervasive. It has certainly captured the Republican party – only ten of whose House members voted to impeach the outgoing President – despite the president’s sworn commitment to:\n\n\nThe facts show President Trump entreated supporters to storm the Congress, in an attempt to stop the lawful certification of his replacement.\n\nIt was a mark of Trumpian reach into Australian political culture that neither that outrage, nor his wilful mishandling of the coronavirus, has brought clear condemnation from the Morrison government.\n\nExtreme becomes mainstream\n\nAnother trait of Trumpism is the tacit legitimisation of an extreme right-wing discourse of grievance, white supremacy, and anti-establishment conspiracy theory.\n\nRead more:\nWhy the alt-right believes another American Revolution is coming\n\nDespite clear mainstream costs, senior Morrison ministers have pointedly refused to contradict or discipline their own MPs (Craig Kelly and George Chrsistensen) spreading incorrect and potentially dangerous Trumpist dogma surrounding US electoral fraud, Black Lives Matter, COVID-19 treatments, and claims of left-wing agent provocateurs in the Capitol insurrection.\n\nDrawing a typically Trumpist equivalence, acting Prime Minister Michael McCormack referenced last year’s Black Lives Matter rallies – which he derisively termed “race riots” — to play down the Capitol siege while also trotting out offensive lines such as “all lives matter”.\n\nRead more:\n\nFaced with a backlash, McCormack decried those “confecting outrage” as “bleeding hearts”.\n\nIt suggests the calculation already being made by ministers is that nourishing an extremist culture of resentment and anger is more useful to a centre-right government than courting the political middle ground.\n\nAmerica has already been down this path, and we know where it leads.The Conversation\n\nMark Kenny, Professor, Australian Studies Institute, Australian National University\n\n\nWhy the alt-right believes another American Revolution is coming\n\nClare Corbould, Deakin University and Michael McDonnell, University of Sydney\n\nThe alt-right, QAnon, paramilitary and Donald Trump-supporting mob that stormed the US Capitol on January 6 claimed they were only doing what the so-called “founding fathers” of the US had done in 1776: overthrowing an illegitimate government that no longer represented them.\n\nThis was the start of what they called the “second American Revolution”.\n\nThis is why the “Don’t Tread on Me” flag was visible in the chaos — a symbol of resistance that dates back to the (first) American Revolution and was resurrected a decade ago by Republican Tea Party activists.\n\nIt is not hard to understand the appeal of this history to Trump’s followers. The era of the “founding fathers” has always loomed large in the minds of most Americans. And stories about the past are, after all, how individuals, families, and communities small and large, make sense of themselves.\n\nYet, it is worth noting these recollections of the past are necessarily selective.\n\nThe right to life, liberty — and to abolish government\n\nAlt-right extremists, following conservative politicians, have also drawn succour from the Constitution, particularly when it comes to their “rights”, such as the right to free speech and bear arms.\n\nThese and other rights were not actually enumerated in the original Constitution, but rather tacked on in the Bill of Rights — a set of ten amendments passed to appease opponents of the Constitution and get it ratified.\n\nThese rights are fused together with the more vague yet “unalienable” rights enunciated in the 1776 Declaration of Independence — chief among them being the right to “life, liberty and the pursuit of happiness”.\n\nRead more:\nWhy were the Capitol rioters so angry? Because they’re scared of losing grip on their perverse idea of democracy\n\nDrawing on philosopher John Locke’s ideas, the Declaration of Independence proclaims “we the people” come together to form a government to protect these rights.\n\nAnd crucial to Trump supporters today, it says,\n\n\nThis was the sentiment voiced on January 6 when pro-Trump rioters stormed the Capitol. They chanted “This is our America” and “Whose house? Our house!”\n\nTrump himself encouraged this thinking when he told the crowd before they marched to the Capitol, “You’ll never take back our country with weakness.”\n\nThe question is: who do Trump and, more broadly speaking, the alt-right think has taken the United States from them?\n\nMany protesters outside the Capitol carried signs against the government.\nJohn Nacion/STAR MAX/IPx/AP\n\nRights for only a select few\n\nThe answer is evident in how the alt-right imagines the past: their vision of history omits or callously ignores the fact their constitutional rights have come at the cost of the lives and rights of others.\n\nThomas Jefferson wrote in the Declaration of Independence it was a “self-evident” truth “that all men are created equal.” Generations of enslaved and free Black activists and their allies have worked towards realising this goal.\n\nRead more:\n\nBut for the founding fathers, and many of their white supremacist heirs, true “citizens” were exclusively white and male. A few years after penning the declaration, Jefferson denounced Black people as inferior. He owned hundreds of slaves. Even his own children, whom he fathered with Sally Hemings, were born into slavery.\n\nAlmost all of the founding fathers, in fact, were slaveholders or profited from the slave trade. Neither the Declaration of Independence nor the Constitution freed any of the half million enslaved people in the new United States — one-fifth of the population.\n\nRather, the Constitution purposefully entrenched the institution of slavery. By protecting the rights of slaveholders to pursue their happiness by holding on to their “property”, it doomed four more generations to enslavement.\n\nSigning of the Declaration of Independence\nSigning of the Declaration of Independence, by Armand Dumaresq.\nThe White House Historical Association (White House Collection)\n\nBy the start of the Civil War in 1861, there were 4 million people enslaved in the US.\n\nThe Constitution also gave the government the power to raise an army. After the American Revolution, this power was used time and again to wage a long genocidal war against Native Americans across the continent.\n\nWhen enslaved and free Black people and their white abolitionist allies acted against slavery, slaveholders invoked the Revolution. They claimed they were undertaking God’s will to complete the work begun in 1776 of creating a free nation, and made slave-holding former President George Washington their hero.\n\nIt took an unprecedented and destructive Civil War to finally put an end to slavery, and another century or so for African Americans to achieve full rights as citizens in the United States. Every step of the way, they were contested and blocked by individuals, groups, states and judges who claimed they were upholding the principles of the Constitution.\n\nRead more:\nWhy is the Confederate flag so offensive?\n\nRights trump equality\n\nIt should be no surprise, then, the alt-right movement is invoking the same “Revolution” today.\n\nAfter Barack Obama’s presidency, Trump gave a voice to the grievances of his largely white supporters who feared they were being displaced in their own country.\n\nAnd following the summer of the Black Lives Matter movement and Trump’s baseless claims the 2020 election was stolen, the Capitol Hill insurrectionists firmly believed “they” had lost control of the United States. They were no longer the “we the people” in charge.\n\n'We the people will bring DC to its knees'\nA sign at the Capitol insurrection declaring, ‘We the people will bring DC to its knees’.\nJohn Nacion/STAR MAX/IPx/AP\n\nAs in the past, they also had the support of prominent politicians beyond Trump. One of their supporters, the newly elected Congresswoman Marjorie Taylor Greene (who is also a QAnon supporter) declared before the January 6 move to block the certification of Joe Biden’s presidential victory,\nThis is our 1776 moment”.\n\nAnd Congressman Paul Gosar, a prominent Trump supporter, wrote an op-ed entitled “Are we witnessing a coup d’etat?” in which he advised followers to “be ready to defend the Constitution and the White House”.\n\nIt has never been entirely clear when exactly the United States was last great in the minds of Trump supporters wearing their “Make America Great Again” caps. It might be the Ronald Reagan presidency of the 1980s for some, or sometime prior to the civil rights, women’s and gay liberation movements and the US defeat in Vietnam.\n\nBut there’s no doubt as to when this mythical greatness started. The yearning for the founding era — a time when slaveholders overthrew a government to protect their rights (including the right to hold people as property) — is palpable.The Conversation\n\nClare Corbould, Associate Professor, Contemporary Histories Research Group, Deakin University and Michael McDonnell, Professor of History, University of Sydney\n\n\nWhy social media platforms banning Trump won’t stop — or even slow down — his cause\n\nBronwyn Carlson, Macquarie University\n\n\n\n\n\n\n\nNot budging\n\n\n\n\n\n\n\n\n\n\nRead more:\n\nThe psychology of hate\n\n\n\n\n\n\nSocial media and white supremacy: a love story\n\n\n\n\n\n\n\n\nRead more:\n\nThe need for a paradigm shift\n\n\n\n\n\nRead more:\n\nThe Conversation\n\nBronwyn Carlson, Professor, Indigenous Studies, Macquarie University\n\n\n\nHelen Young, Deakin University\n\nMedievalist references littered the insurrection at the US Capitol on January 6th.\n\nRudy Giuliani called for a “trial by combat”; the “Q Shaman”, Jacob Chansley (also known as Jake Angeli), was covered in Norse tattoos; rioters brandished a flag with a Crusader cross and the Latin words Deus Vult: a Crusader war cry meaning “God wills it” that has been taken up by the far-right.\n\nThese far-right appropriations of the European Middle Ages are important reminders that recent violence has a long history and global scope. Medievalist symbols were displayed at the 2017 Unite the Right rally in Charlottesville. The Christchurch terrorist’s manifesto referred to Norse and Crusading medievalisms.\n\nThere are many other examples.\n\nExtremists misinterpret and appropriate medieval culture to suit their own purposes. They add new modern meanings to historical images and ideas and put them in new contexts. To understand why and how, we need to look to the modern world, not the Middle Ages.\n\nMedievalism and whiteness\n\nThe association of the European Middle Ages and white identities reflects modern racisms more than medieval realities.\n\nIn the late 18th century, nations like England, Germany and France needed new origin stories that accounted for the emerging pseudo-science of race and the support imperialist claims of superiority over peoples they sought to subjugate.\n\nIn the 18th Century, white Europeans developed new unscientific definitions of ‘race’, such as in this 1851 map of Johann Friedrich Blumenbach’s five races.\nWikimedia Commons\n\nThe Middle Ages had been understood as a dark period of barbarism between Classical and modern times, but were re-imagined as the crucible of European whiteness and its variations such as “Celtic” and “Anglo-Saxon”.\n\nThe roots of social and cultural institutions were linked to ideas of biological descent.\n\nIn the 1700s, the Germanic “Gothic race” was understood, especially by the English and Germans who claimed descent, as having an inherent love of freedom, capacity for violence and respect for women. These supposed qualities were said to have led to the feudal system of government, chivalry and particular cultural aesthetics.\n\nRead more:\n\nThe same ideas were linked to an imagined “Anglo-Saxon race” in the British Empire and its colonies. Racialized ideas about freedom that come from the 18th and 19th century are still influential among white extremists.\n\nIn architecture, academia, literature, language and art, whiteness was associated with the Middle Ages in ways that still resonate in 21st century society and culture. Pre-Raphaelite art created a white medievalist aesthetic reflected in modern TV shows like Game of Thrones (2011-19) and The Last Kingdom (2015–).\n\nThe pre-Raphaelites reimagined the Middle Ages as a white society, such as in this 1901 painting by Francis Bernard Dicksee.\nBristol Culture, CC BY-NC-SA\n\nThis association of white racial and cultural identity with the European Middle Ages is still strong in mainstream culture, as well as among extremists. We only need to look at controversies, such as the black British actor Jodie Turner-Smith playing Anne Boleyn.\n\nWhy do white supremacists use medievalist symbols?\n\nWhite extremists take up existing ideas to legitimise their ideologies and false claims about the past. A rigidly structured feudal society ruled through violence by a king and nobility is appealing to fascists.\n\nMost Western nations, including Australia, understand the European Middle Ages as part of their heritage. A copy of the Magna Carta, an English royal charter from 1215 often said to have enshrined trial by jury and other legal freedoms, hangs in Parliament House in Canberra. This makes medievalist symbols useful in allowing extremists to reach across national borders.\n\nMedievalism is everywhere in contemporary Western culture, from entertainment like Vikings (2013-20) and the Assassin’s Creed video game franchise, to home loan and credit card advertisements, political discourse, themed restaurants and much more.\n\nThis helps make extremist associations deniable. Hate symbols can be hidden in plain sight when their meaning is open to question.\n\nWhile Chansey’s tattoos are classed as hate symbols by the Anti-Defamation League (ADL), they also note they are sometimes used by “non-racist pagans”.\n\nRead more:\nUS Capitol riot: the myths behind the tattoos worn by ‘QAnon shaman’ Jake Angeli\n\nPopular culture medievalisms contribute to this deniability and provide opportunities for radicalisation through shared interests.\n\nFormer Ku Klux Klan member Derek Black started a section dedicated to Lord of the Rings and fantasy (a major area of popular medievalism) on the white supremacist site Stormfront in the early 2000s specifically to recruit people to white nationalist ideology. He told the New York Times he thought people who liked the “white mythos” of Lord of the Rings could be “turned on by white nationalism”.\n\nMore recently, video games and gaming websites — where medievalist material is common — have become major sites of concern for anti-radicalisation practitioners and policy makers because of activity by the far right.\n\nAwareness is needed\n\nRecent years have seen an increase in white extremist violence, including — but not limited to — mass-murderous terror attacks. It is increasingly important that we are aware of hate symbols.\n\nThe ADL’s advice to consider context in deciding if a particular use of a symbol is “racist” is not necessarily useful in deciding whether it is a sign of white extremism because of deniability and exploitation of common beliefs.\n\nMedievalist symbols like those displayed at the Capitol have been linked to white European identities for centuries. Their use by violent extremists means that this connection can not be denied, ignored, or thought of as a neutral choice. We must deliberately, actively, and explicitly reject hateful meanings and the violence that goes with them in all aspects of our medievalist modern world.The Conversation\n\nHelen Young, Lecturer, Deakin University\n\n\nDespite being permanently banned, Trump’s prolific Twitter record lives on\n\nAudrey Courty, Griffith University\n\n\n\n\nRead more:\n\nThe de-platforming of Donald Trump\n\n\n\n\n\n\nWhere did all the information go?\n\n\n\n\n\n\n\n\n\n\n\nScreenshot taken from\n\nA matter of public record\n\n\n\n\n\nRead more:\n\nThe closest thing to a town square\n\n\n\n\n\nThe amplification effect\n\n\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7251116037368774} {"content": "\n\nClick on the audio player above to hear about Heavy D‘s come up, from his upbringing in Mount Vernon, New York to the forming of “Heavy D & The Boys,” the success of their first album, and thus their subsequent career. Find out how Heavy D made hip hop history; plus, hear which incredible artists his recommendations put on.\n\nRELATED: Behind The Hip Hop: Slim Thug [EXCLUSIVE AUDIO]\n\nRELATED: Behind The Hip-Hop: Busta Rhymes [EXCLUSIVE AUDIO]\n\nRELATED: Behind The Hip Hop: Marley Marl [EXCLUSIVE AUDIO]\n\n\n\nBehind The Hip-Hop: Heavy D [EXCLUSIVE AUDIO]  was originally published on edlovershow.com", "pred_label": "__label__1", "pred_score_pos": 0.9074598550796509} {"content": "How Are DST Funds Protected? | Reefpoint LLC\n\nHow Are Deferred Sales Trust Funds Protected?\n\nIn previous articles we discussed how the Deferred Sales Trust (DST) is a specialized form of installment sale authorized by Section 453 of the Internal Revenue Code. In a DST Trust installment sale, the entire course of the transaction and its continued operation revolves around a secured installment note in favor of you, the seller. In this context, “secured” means that all of the assets in the DST serve as collateral, i.e., security, for repayment of money to you per the note’s terms.", "pred_label": "__label__1", "pred_score_pos": 0.9769240021705627} {"content": "\"River Song's World\" is a title based upon conjecture.\n\n\nRiver Song's World was an alternate timeline - described by the Eleventh Doctor as \"another reality\" and River Song as a \"world that never was\" - created by River Song when she refused to kill the Eleventh Doctor, interfering with a fixed point in time. Time itself began to collapse and all of Earth's history occurred simultaneously within a bubble of time, with the rest of the universe still turning outside.\n\nHistory[edit | edit source]\n\n\n\n\nThis alternate timeline was negated when the Doctor convinced River Song to make physical contact with him in the form of a kiss. Because she and the Doctor were the opposite poles of the disruption in time, their touching caused time to be returned to its original state, where River \"killed\" the Doctor. (TV: The Wedding of River Song)\n\nAlternate resolution[edit | edit source]\n\nA Dalek continuity bomb revealed another version of the timeline where the Eleventh Doctor chose not to save the universe after River refused to kill him. The Doctor and River married in this timeline and lived a domestic lifestyle, even as the rest of the universe would inevitably collapse around them. The Tenth, Eleventh and Twelfth Doctors briefly visited this reality to collect the equipment they needed to defeat an alternate version of the Twelfth Doctor. (COMIC: Four Doctors)\n", "pred_label": "__label__1", "pred_score_pos": 0.9059141278266907} {"content": "About three years ago, some relatives visited our city and enjoyed their time shopping at our huge international farmers’ market. They racked up on small containers of packaged spices that are hard to find elsewhere, and packed them in their luggage.\n\nAfter flying back to their home state, they found a note with their bags from the TSA indicating that their spices were given an extra once-over. Unsure if that search included fingertips or tasting of the goods, said relatives threw their haul out. Lesson: they must pass the TSA’s tests.\n\nIn the last year or so, they’ve increased their efforts on powder checks for domestic flights. This year, the TSA is making sweeping changes to its policies on powders like dry spices. Travelers coming from foreign countries can expect to go through extra security measures if carrying such items.\n\nEffective June 30, the agency is asking checkpoint agents at international airports to screen powders in carry-on luggage. Currently, the limit for powders is 350 milliliters and can include items like baby powder, baby formula, protein powder, or spices.\n\nIf the container is larger than that amount, travelers will be asked to either pack the item in checked baggage or discard it. Those that do meet the size requirement for their carry-on may be asked to place their powder containers in a separate bin for additional screening.\n\nX-ray allows for faster scanning if the contents of a bag are identifiable and can pass. Hand checks are also being used if the X-ray isn’t enough, and that can entail opening your containers. This can cause the lines to slow down, so if you plan on traveling with spices or other powders into the U.S., be prepared.\n\nAccording to the New York Times, a spokesperson for TSA cites how certain powders like pepper or fentanyl can harm crew and passengers, and that these rules are necessary.\n\n“These measures are part of T.S.A.’s efforts to stay ahead of threats, keep passengers safe and constantly increase capabilities through a layered approach to security.”\n\n“We encourage people to divest certain items – especially organic items – in order to get a clearer view of what’s going on inside the bag. It’s something we advise people to do. We’re asking our foreign partners to do what we’re already doing domestically.”\n\nAs criminals get more creative in how they get around security protocols, measures like these are being taken in an attempt to prevent dangerous incidents from occurring. Keep in mind that if you’re carrying a powdered item and TSA can’t verify/identify it, they will more than likely confiscate it or ask you to dispose of it.\n\nSince this is a fairly new rule, it is highly possible that many travelers aren’t aware of it yet and will not find out until they get to the airport. That means slowdowns in the security lines. Unlike liquids, the TSA has not given a separate update on powders on their website. We hope this helps!\n\nWere you aware of the new rules on powder screenings? How will this affect your international travel plans? Are you happy about TSA ramping up their efforts?\n\n\nUSA Today", "pred_label": "__label__1", "pred_score_pos": 0.9499303102493286} {"content": "skip to Main Content\nElephant Conservation In The TCA: Sand Dams To Provide Water In Times Of Drought\n\nElephant Conservation in the TCA: Sand dams to provide water in times of drought\n\n • Blog\n\nThose of our social media following that our local to Kenya will know that the much awaited rains have finally come. It’s great news for all of us and, at the Tsavo Trust, we know how important this precipitation is to both the animals we look out for and our human neighbours.\n\nIf you missed our previous article on how Kenya is affected by the seasonal rains, you can access it here.\n\nThis year’s rains are especially exciting because they give us a chance to assess the success of one of our latest projects. Over the last couple of months, we’ve been building sand dams over some of the then dried-up river beds.\n\nWith the rains here, we’re hoping, those dams can now start filling up. The idea is that water will get trapped in the sand. This will create underground deposits of water that may help the elephants we monitor make it through the next dry season.\n\nKangechwa Sand Dam For Elephant Conservation\n\nSand dams: how do they work?\n\nMost drylands, much of Tsavo included, are not visited by rainfall for long periods of the year. When it does come, as it is doing now, it falls quickly and heavily. So quickly, in fact, that the water often slides atop the surface of the earth. Often, it will wash away loose topsoil which is essential for new plant growth.\n\nThe water enters into established rivers and other waterways, quickly leaving the areas that need it and, eventually, entering the oceans.\n\nSand dams are very simple constructions often built of concrete. They aren’t designed to stop the water’s natural course, merely to slow it down. Here in the Tsavo Conservation Area, we’ve put them at various catchpoints over our regionally filled riverbeds.\n\nWhen the rains come, the water, with silt and sand mixed in, meets with these dams and quickly builds up. The sand, which is heaviest, gets caught behind the barrier. A layer of sand builds upstream of the dam and, when that layer is tall enough, the water and silt simply flows over it and the dam, continuing on downstream.\n\nThat layer, however, remains when the rains leave. And within that thick blanket of sand, large quantities of water are trapped, protected from evaporation, filtered clean and kept for when is needful.\n\nKambu River Sand Dam For Elephant Conservation\n\nWhat is the significance of these projects?\n\nSand dams are an incredible invention. The trapped water is often good enough for humans to drink right away. And, if there is real need, and pipes are lain before the sand accumulates, sand dams can become a staple source of water for humans in areas that lack regular rainfall.\n\nThe sand dams built by our team at the Tsavo Trust are, however, not designed for human use. We’ve built ours within the national park, where humans are not allowed to wander, and we’re hoping to see a whole host of changes brought about by their creation.\n\nElephants can drink up to 200 litres of water a day. Their huge bodies and active lifestyles require quite a bit of hydration. They will often keep a catalogue of known watering holes, and herds are known to travel miles from one to the other.\n\nIn times of scarcity, however, elephants have developed the habit of digging for water in dry river beds. With their tusks and trunk, they’re quite capable of digging deep holes where other animals cannot.\n\nIt is this useful skill of theirs that prompted our creation of these sand dams. It is our hope that, if their need is great enough, elephants will always be able to locate a protected store of water behind the dams we have built.\n\nFurthermore, we expect that these additions to the Tsavo National Park will benefit others as well. Once elephants have dug their watering holes and drunk their fill, other animals are known to take advantage of the wells created by those useful tusks.\n\nWe also believe that the sitting water will encourage plant life to take root and hopefully rejuvenate the flora around Tsavo. This, in turn, is likely to shore up and stabilise the topsoil that heavy rain tends to wash away. All in all, we expect that these sand dams could have a huge impact on the area.\n\nOther effects of these great inventions\n\nProviding a stable and accessible source of water to the elephants that we have made it our mission to conserve is, at the Trust, our principle aim. Our sand dams are designed for elephant conservation. However, we just wanted to take a little time to talk about the huge, and potentially life-changing application of this invention in human lives.\n\nVery often, in dryland areas, local human inhabitants can find it very difficult to access drinking water. Often, members of a family are forced to walk miles in the search for it.\n\nSand damns, as we touched on above, can be piped and protected for human use. Incredible organisations such as The Water Project consider the sand dam as one of the best weapons at humanity’s disposal in the battle to provide clean drinking water to all.\n\nEmployment For Sand Dams\nThe Water Project believes that a stable source of water can have far-reaching effects on human communities. A sand dam has the potential to bring security to families anxious over whether they’ll survive dry seasons. It can free up time for children to be educated and adults to tend to their land better or secure new sources of income. It can also narrow the potential for human-animal conflicts. With more water available, and protected for those that use it most often, there is less scope for humans to enter animal-dominated spaces and vice versa.\n\nWe hope you this news has found you well. Stay tuned for an update on how our sand dams are working out in a couple months’ time!\n\nBack To Top", "pred_label": "__label__1", "pred_score_pos": 0.8417514562606812} {"content": "Melanie Yennam\n\nVenture Data Scientist\nMelanie Yennam\n\nHer role at 1848 Ventures:\n\nMelanie is focused on bringing an analytic eye to the data landscape. Turning history into fuel for our venture portfolio.\n\nWhat she loves about the work we do:\n\n“I love the consistent sense of vision at 1848 Ventures; innovate with the purpose of helping businesses solve problems and ultimately become more successful.” \n\nWhich of our “How we show up” behaviors resonates with her most:\n\n“Radically Collaborative. I believe math and sciences are at their best with a healthy exchange of ideas; it pushes us as a community to the next level. The same is true for business solutions, they are their most creative and most effective when the whole team is engaged and contributing to its success.” \n\nCareer highlights:\n\nMelanie has a background in mathematics and applying quantitative reasoning to create models and showcase analysis that makes the way for more targeted and efficient business processes.\n\nWhat she’s passionate about:\n\nMathematics and data describe the world around us, understanding both deeply gives way to the ability to create anything.\n\nFun fact:\n\nMelanie likes to garden, crochet, periodically draw, learn how to cook a new Indian dish with her husband, go for a solid hike or scenic bike ride, and play board games.", "pred_label": "__label__1", "pred_score_pos": 0.9746788144111633} {"content": "Nursing is both a calling and a career path. It is one of the most fulfilling jobs that are available to people today. Most of them have chosen this career path because they love to help people. They tend to have a very positive effect on the lives of their patients. If you enjoy making a difference in people’s lives, nursing is the best option for you. It is a career filled with many opportunities, rewards, and challenges. \n\nTo become one, you will require sending in your resume to different hospitals for consideration. A career expert and a former nurse, Laura G., from nursing resume service, says: “The nursing resume can be quite impactful in attaining your dream job. Their employers are very strict and you should deliver your nursing CV in a matter of hours upon request.” If you are still not sure of becoming one, here are eleven reasons why:\n\nFlexible Work Schedule\n\nDepending on your needs, you can switch up your work schedule as you please. You can easily take an evening shift if working during the day won’t suit you. You can also opt to work over a long period in a few days so you can get more time for family. \n\nCompetitive Salary\n\nThere is always a high demand for exceptional nurses. This translates to a higher salary for all of them. Nursing practitioners are paid very well and get many benefits. During this COVID-19 menace, they are needed even more than before.\n\nInteresting Specialities\n\nThey can work in diverse environments. They can opt for psychiatric wings or emergency rooms. They have a wide range of options when it comes to choosing a specialty. A nursing degree can land you a job in any degree.\n\nWell-Respected Job\n\nThey have a long reputation for being compassionate, healers, and nurturers. They are ranked highly in society and the medical profession. The job has very high ethical standards. \n\nVariety of Work Environments\n\nThey are not limited only to hospitals. They can work in schools, corporate clinics, or even nursing care facilities. They have a variety of options to choose from when it comes to locations.\n\nProfessional Development Opportunities\n\nThey are continually learning new things on the job. There is a huge opportunity to learn new things every day. There are many professional development opportunities available.\n\nExciting Profession\n\nThis is not a normal desk job. They get a lot of exciting experiences while on call. The job will allow you to meet different people from different backgrounds every day.\n\nSteady Growth\n\nNurses are required in very many different ways. There is an increase in demand each year for them. There is always a need for them in health insurance and many advances in the health industry.\n\nExcellent Training Options\n\nThere are many existing training options for nurses. They are usually presented by different training options to advance their knowledge and skills. They can access different training programs online to help them gain a deeper understanding of the industry.\n\nBuild Relationships\n\nNurses around the world are acknowledged for saving people’s lives. This has developed many intricate relationships with the families of the patients, especially if they have terminal illnesses. Many of them spend weeks, months, and even years with different patients. They get to know them on a profound level.\n\nTravel the World\n\nNursing is a meaningful career all over the world. There are many job opportunities in different parts of the world. They can work easily in various places once accredited with the relevant authorities.\n\n\nNursing is an excellent career path. It provides tremendous advantages that both nurses and the patients’ experience. There is always a high demand for nurses to ensure great pay. A nursing job is easily transferable, making the working hours extremely flexible.", "pred_label": "__label__1", "pred_score_pos": 0.5111036896705627} {"content": "Unit 21 Human Resource Management Sample Assignment Copy\n\nHuman Resource Management Sample Assignment Copy\n\nUnit 21 Human Resource Management Sample Assignment Copy\n\n\nDiploma in Business (Marketing)\n\nUnit Number and Title\n\nUnit 21 Human Resource Management Assignment Copy\n\nQFC Level\n\nLevel 4\n\nCredit value\n\n15 credits\n\n\nHuman resource management is the most important aspect of an organisation which contributes in shaping the firm and achieving the desired goal (Armstrong & Taylor, 2014). The report will cover all the point of human resource management and discuss in detail about the personnel management and human resources management, the importance of recruitment and selection and how the pays should be directed, the motivation theory and also the how an employees must be rewarded. The company chosen in the report is Tesco and detail related to it is discussed in respective questions. In the end, report will also discuss in detail about the termination policy and legal framework related to it.\n\nTask 1\n\nA) Explain the difference between personnel and human resource management and assess your role and responsibilities as a line manager.\n\nDifference between personnel and human resources management - Human resources Management is an extended version of personnel management. Human resources management has worked on the study of human management whereas personnel management just deal with salary and recruitment part of human resources management (Armstrong & Taylor, 2014). Following is the detailed discussion of the difference between personal management and human resources management: -\n\n 1. Human resource management on one hand is more modern approach towards managing people on the other hand personal management is traditional in nature and it is being practised from ages now (Armstrong & Taylor, 2014). Only recently the importance of human resources management has increased so much that people have now started looking at human resources from completely different perspective.\n 2. The approach of personnel management is narrower in approach where they only deal with concepts like personnel administration, employee welfare and also labour relation (Armstrong & Taylor, 2014). While on the other hand human resources management is broader in approach which includes everything related to human management like acquisition, training and development, motivation and retaining the people.\n 3. In personnel management, people are treated as mode of achieving the set results while in human resources management people are treated as special and valuable entity of an organisation (Berman et al, 2012).\n 4.  The focus of personnel management is related to the personnel activities which directly lead to the satisfaction and in human resources management, the main focus is achievement of goals through planned and administrative function.\n 5. In case of personnel management, the job is designed on the basis of factors like division of labour on the other hand, in case of human resources management the job is designed on the basis of team work and group design (Berman et al, 2012).\n 6. Personnel management does not have any focus on the training and development of the employee and employee usually learn to work on the job while in case of human resources management the main focus is on training and development of the employees (Berman et al, 2012).\n 7. In case of personnel management, mainly most of the decisions are taken by the top management and follow the strict line of rules and regulation (Berman et al, 2012). While on the other hand, human resources management, decisions are taken in a collective manner and everything is considered like employee’s participation, decentralisation and the environment in which they work.\n 8. Personnel management focus is on production and satisfaction of employees while in case of human resources management the main focus is on effectiveness, culture, and productivity (Berman et al, 2012).\n 9. Personnel management contains personal manager and in case of Human resources Management contains all type of managers from top to bottom.\n 10. Personal management is normally a routine function and in case of human resources management is more of strategic functions.\n\nRole and responsibilities as a line manager - Line manager is a person who directly deals with the employees and get them work to get the desired result. They manage the employees or team of people and they are the mediator between the employees and high level of management (Berman et al, 2012). They are the one who execute and implement all the policies being formulated by the top level of management among the lower level of management and they are the one who pass on the performance related information and other issues or problems of the employees to top level management (Berman et al, 2012). Line managers have a supervisory job and they direct the employees.\n\nB) Analyse the organisational environment and discuss how it impacts the HRM function in your organisation.\n\nOrganisation is very important for the business environment and every organisation has to function within the boundaries of environment which is prevailing in the market (Robbins & Judge, 2012). The impact of organisation environment is very important and crucial. The relationship between the organisation and organisation environment can be analysed in three main ways which are discussed as follows: -\n\n 1. The organisation is a body of work where the system is followed called input and output. Therefore input is used to produce output and output is goods, services and profits which are given back to the environment (Robbins & Judge, 2012). The process also analyse the type of input which should be taken to analyse the output.\n 2. Organisation is the main focus of understanding the main contribution of different groups which function within the organisation and outside the organisation as well. The organisation must make sure that these groups have a legal right to contribute in the organisation (Robbins & Judge, 2012). These groups mainly consist of employees, shareholders, customers, suppliers and society in which the organisation functions. The activities of the organisation will be highly influenced by the groups and their expectation from the organisation.\n 3. The organisation functions in an environment which is full of opportunities and threats and what is crucial here that the organisation must most of the opportunities which are available and must make a way for dealing with the threats (Robbins & Judge, 2012).\n\nImpact of organisational environment on HRM function\n\nFollowing is the detailed discussion of impact of organisational environment on HRM functions: -\n\n 1. Due to constant technological innovation, technically qualified employees are required at so many places and demand of such employees is only increasing.\n 2. Economic condition is also very important and it influences the financial health of the organisation. HRM function gets influenced by the economic factors of the country as well (Robbins & Judge, 2012).\n 3.  Labour market is another very important aspect and the organisation are always in need of employees and workers in order achieve the result. Labour demand and supply affects so many functions and compensation and staffing is main points which create implication on the activities (Budhwar, & Debrah, 2013).\n 4. Changing demand in HRM is also affecting the organisation functions. The company constantly has to undergo so many changes which also impact the demand of employees in the firm.\n 5. Legal factor is one of the most crucial aspects of HRM which get affected by the organisational environment. The company tries it best to manage the employees in terms of the legal system of the country. There are many acts in legal system which impacts the organisational function like trade union act, compensation act, the minimum wages act, payment of gratuity act and many more. There are acts like maternity benefit act as well which make sure that the employees are working in the best working conditions and the government of the country make sure that the industrial and economic activities are followed well in connection of the legal framework of the country (Budhwar, & Debrah, 2013).\n\n Need help?\n\n Get Complete Solution From Best Locus Assignment Experts.\n\n Place an order\n\nTask 2\n\nA) Explain and asses the role of human resource planning in your organisation and discuss the stages of the planning process.\n\nFollowing is the role of human resources planning in the organisation: -\n\n 1. Human resources as discussed is one of the most important function in HR and the planning the HR functions should be done extreme care and it should meet all the job requirement and also wellbeing of the employees. As the business grows, every company requires supply of employees for important functions of the organisation and any successful company will manage the human resources aspect in line with the overall strategy plan. So basically human resources planning will help in achieving the business goals of the organisation (Jackson et al, 2011).\n 2. A significant part of human resources planning is forecasting the employees demand in the organisation. There are number of factors which has to be considered in forecasting the demand like sale and revenue and the rate at which the company is growing. The financial success is automatically connected with the human resources planning as the business grows company automatically need more people who are qualified and bring more success in the company.\n 3. Human resources planning also help the company to be more proactive and prepared for the future. When things will be planned in advance it will be easier for the company to be prepared for everything (Jackson et al, 2011).\n 4. Human resources planning also help in finding the right balance between the effective employees and the services.\n\nFollowing are the stages of planning process\n\n 1. Assessing the employee’s requirement:- the first stage is assessing the HR requirement and the environment is also assessed with the help of PEST. The HR inventory is also assessed on the basis of the requirement. By assessing the entire requirement, the company can understand the weakness and the strength of the company and decide what is needed in the company (Al-Otaibi et al, 2012).\n 2. Demand forecasting: - human resources forecasting help in deciding the demand of the employees and the sources through which supply will be made. Future requirement can be assessed with the help of current human resources in the company and its need.\n 3. Supply forecasting:- it is the flip side of human resources planning and it is related with the estimation of supply of human resources. It also helps in deciding the future requirement which can arise from the internal promotion or transfer or job enlargement and job enrichment (Al-Otaibi et al, 2012).\n 4. Matching demand and supply: - in another step human resources planning, covers the future demand and supply of the human resources. The matching procedure aims at bringing the demand and supply at par. Therefore to get the equilibrium, whenever there is a shortage of employees, over staffing has to be done to come at par with the employees (Al-Otaibi et al, 2012).\n 5. Action plan: - it is the last phase of human resources planning, in which surplus and the shortage of human resources is tested. The human resource plan is executed through different range of post in different human resource function (Al-Otaibi et al, 2012). The major and important functions are recruitment, selection, placement, training and development. In the end, control and evaluation activity is followed in which all the planning is matched with the objectives and policies so that everything can be updated as and when required.\n\nB) Analyse the recruitment and selection process in your chosen organisation and assess your contribution as a deputy to the Human Resource Manager.\n\nThe company is in constant need of the people in both categories store based and non-store based jobs. Tesco aims in ensuring that all the activities functions in line with the main objective of the organisation (Zhao & Liden, 2011). Also to do achieve successful recruitment and selection process the company follow a structured process in all the categories like managerial and operational roles.\nFollowing is the recruitment and selection process followed in the company: -\n\n 1. The company uses the method of workforce planning to understand the demand of new people in the company. The company has a structured form of planning cell which looks after all the requirement of manpower in the company (Zhao & Liden, 2011).\n 2. The company tries to fill many positions within the company and that saves the cost of the training and acquiring the new employees. The company follows a process which widely known as talent planning (Zhao & Liden, 2011).\n 3. In Tesco the recruiters give a lot of importance to the job description and person specification as it helps in the potential candidates to understand, of what is expected from them.\n 4. The company devote a lot of time in understanding the nature of each job and the qualities require achieving each task. The company need people who right and appropriate for the each job (Zhao & Liden, 2011).\n 5. The first stage of recruitment is internal recruitment and then there is external recruitment. Initially the company tries to recruit people within the company and then invite people from outside to apply for the job and then the proper recruitment process is followed from inviting people for interviews to training and development (Zhao & Liden, 2011).\n 6. The selection of the employees is done on the basis of getting the most suitable person who is most appropriate for the vacancy. This also includes screening of the candidates in the selection process. People who are screened and selected for the interview should be best fit for the job (Kumari, 2012).\n 7. People who pass screening attend assessment centre which are the part of stores and run by the managers of those stores. These processes help in providing the consistency in the selection procedure. Candidates who pass the internal assessment centre are called for the interview. Line manager usually take the interview (Kumari, 2012).\n\nFor complete copy of this solution, order now from Assignment Help", "pred_label": "__label__1", "pred_score_pos": 0.9463794827461243} {"content": "Nitride Powder\n\nGallium Nitride GaN powder CAS 25617-97-4\n\nItem No.: Tr-GaN\nGallium nitride, the chemical formula GaN, it is a compound of nitrogen and gallium, is a semiconductor with a direct energy gap, it can be used in light-emitting diodes.\nPurity: 99.99%\nParticle Size: -60mesh\nGallium Nitride Properties\nProduct Performance of Gallium Nitride GaN powder:\nGaN powder has a wide direct bandgap, strong atomic bonds, high thermal conductivity, good chemical stability (almost no acid corrosion) and other properties and strong anti-radiation ability in optoelectronics, high temperature and high power devices and high frequency microwave device applications has a broad prospect.\n\nTechnical Parameter of Gallium Nitride GaN powder:\nProduct Name MF Purity Particle Size Melting Point Density Color\ngallium nitride GaN 99.99% -60 mesh 1700℃ 6.1g/mL,25/4℃ light yellow\n\nChemical Composition of Gallium Nitride GaN powder:\nGaN Cu Ni Zn Al Na Cr In Ca\n99.99% 0.0005% 0.0003% 0.0005% 0.001% 0.0005% 0.0003% 0.0005% 0.005%\n\nApplication of Gallium Nitride GaN powder:\n1. GaN may be used for large TV screens or smaller full-color panels in trains or buses. GaN-based LEDs are more efficient and therefore offer another possibility for blue and green LEDs.\n2. Gallium nitride is used in power semiconductor fields such as electric vehicles and photovoltaics.\n3. Gallium nitride is used in the 5G radio frequency field. Due to the increased requirements for radio frequency power and energy consumption in 5G, the 5G radio frequency field will gradually replace silicon-based materials with gallium nitride.\n4. GaN is used in the field of fast charging of mobile phones. GaN chargers have the characteristics of large power, small size and high efficiency, which are the key to the breakthrough of super fast charging technology.\n\nPacking & Shipping of Gallium Nitride GaN powder :\nWe have many different kinds of packing which depends on the gallium nitride GaN powder quantity.\nGallium nitride GaN powder packing: vacuum packing, 100g, 500g or 1kg/bag, 25kg/barrel, or as your request.\nGallium nitride GaN powder shipping: could be shipped out by sea , by air, by express as soon as possible once payment receipt.\n\n\nGallium Nitride Properties\n\nOther Names gallium nitride powder, GaN, GaN powder, gallium mononitride\nCAS No. 25617-97-4\nCompound Formula GaN\nMolecular Weight 83.73\nAppearance Light Yellow Powder\nMelting Point 1700 °C\nBoiling Point N/A\nDensity 6.1 g/cm3\nSolubility in H2O N/A\nExact Mass 82.9287\nMonoisotopic Mass 82.9287\n\nAluminum Nitride Health & Safety Information\n\nSignal Word Warning\nHazard Statements H317\nHazard Codes N/A\nRisk Codes N/A\nSafety Statements 22-24/25\nRTECS Number LW9640000\nTransport Information N/A\nWGK Germany 3", "pred_label": "__label__1", "pred_score_pos": 0.9816392660140991} {"content": "Curtis Guise\n\nThe Second Half of the Marathon Stage Is Where It All Goes Wrong… Or Right?\nby WESTx1000\nControl is a skill. A quality which must be developed carefully; harnessed in the worst of times and forgotten in the best. If we don’t learn to have control, then how would we ever know when to lose it? This is a trait all formidable athletes must have. Keeping the breath steady. Focusing the mind on observing the terrain, spotting obstacles, following the roadbook. To stay calm, think clearly, and excel under pressure. That takes a sort of power over one’s self that monks spend years in meditation to achieve. And yet, a pilot experiences Zen essentially by necessity. And from it, their craft becomes their therapy. The countryside is like everything we’ve already seen, yet still like nothing else. In the beginning, racers traverse unbeaten roadways made of rubble mixed into khaki-colored valleys carved...\n\nContinue reading...", "pred_label": "__label__1", "pred_score_pos": 0.5949854850769043} {"content": "VIVA 2020: Results from the SUNSET sPE Study - Dr Efthymios Avgerinos\n\n\nDr Efthimios D Avgerinos (University of Pittsburgh Medical Center, Pittsburgh, PA, US) discusses the use of standard against ultrasound-assisted thrombolysis for the treatment of submassive pulmonary embolisms.\n1. What is the rationale of this trial?\n2. What were the design, inclusion criteria, and endpoints of the trial?\n3. What were the key results?\n4. What conclusions can be made?\n5. How should these findings impact clinical practice?\n6. What are the next steps?\nRecorded remotely from Pittsburgh, 2020.\nInterviewer: Victoria Perroud\nRecording Editor: Mike Knight", "pred_label": "__label__1", "pred_score_pos": 0.9314407706260681} {"content": "Survey: Doctors’ political views may affect patient care\n\n\nHealth care has long drawn partisan political fights, like state laws surrounding abortion, or Florida’s law restricting doctors from discussing guns with patients. But there’s been little research on the doctor-patient side of those controversies. Can physicians leave their own political ideology at the door during something as simple as a checkup?\n\nSo Yale University researchers took an initial step, looking up voter registration records and linking more than 20,000 primary care physicians to their party affiliations. Then they surveyed more than 200 of those doctors about how they’d react to different scenarios — health issues that might come up when a new patient outlines his or her medical history during a routine physical.\n\nSuffering depression? In denial about alcohol abuse? Ride a motorcycle without a helmet? Political affiliation didn’t matter; the survey found doctors of both political stripes would react about the same to patients with those and some similar health issues.\n\n\nFaced with a woman who wasn’t currently pregnant but had undergone two abortions earlier in life, Republican doctors were twice as likely as their Democratic counterparts to say they’d discourage any future abortions and 35 percent more likely to discuss so-called mental health aspects of abortion, said study co-author Eitan Hersh, a Yale political science professor.\n\nFaced with a man who uses recreational marijuana three times a week, Republican doctors were 64 percent more likely to say they’d discuss marijuana’s legal risks and 47 percent more likely to urge them to cut back than Democratic doctors.\n\n\n\n\n\n\n\nWhen patients choose a doctor, “they don’t necessarily know what they’re getting ahead of time,” Hersh said, noting that many other issues, from transgender health to end-of-life care, may be affected by the physician’s political views.\n\nHe called the survey a first step to studying the actual impact on patients. (The survey couldn’t reflect whether doctors had recently changed their party affiliation, and didn’t include those who live in states that don’t have registration by party.)\n\n“We don’t leave things at the door,” said Dr. Matthew Goldenberg, a Yale psychiatrist who co-authored the research. “Both patients and practitioners should be aware that there are these biases.”\n\nBy Lauran Neergaard, AP Medical writer", "pred_label": "__label__1", "pred_score_pos": 0.9001762866973877} {"content": "New Zealand Charges 13 Parties Over Deaths At White Island Volcano\n\nNov 30, 2020\n\nNew Zealand's government has filed charges over the volcano eruption that killed 22 people on White Island last year, saying operators that brought tourists to see the country's most active volcano failed to follow health and safety rules.\n\nOfficials say 47 people were on the island when the volcano erupted in the early afternoon of Dec. 9, sending a plume of ash, toxic gas and rocks some 12,000 feet into the sky. Rescue crews rushed to find survivors, and recovery teams spent roughly two weeks trying to find victims.\n\nThe eruption was unexpected, but it wasn't unforeseeable, according to WorkSafe New Zealand, the country's workplace safety agency.\n\n\"Those who went to the island, did so with the reasonable expectation that there were appropriate systems in place to ensure they made it home healthy and safe,\" WorkSafe Chief Executive Phil Parkes said in a statement issued Monday.\n\nThe eruption was a \"hydrothermal explosion,\" the U.S. Geological Survey determined.\n\n\"The volcano had been showing signs of unrest for several weeks before the December 9, 2019, explosion,\" the USGS said. \"In October, seismic tremors and sulfur dioxide (SO2) gas emission rates were at their highest levels since 2016, indicating an increased likelihood of an eruption.\"\n\nEveryone who was on White Island that day suffered \"serious injuries and trauma,\" WorkSafe said. Survivors endured major burns to their skin and lungs.\n\nWorkSafe charged 13 parties in Auckland District Court — 10 organizations and three people. Nine of the groups are charged with failing to ensure the health and safety of workers and others, while the other is charged with failing to control a workplace. Each of those charges carries a maximum fine of more than $1 million.\n\nThe three individuals face smaller fines, charged under a provision that requires people \"with significant influence over a company to exercise due diligence\" in meeting health and safety obligations.\n\nWorkSafe has not named any of the parties, noting that they have a right to ask for their names to be suppressed at their first court appearance.\n\nWhite Island, which is also known by its Maori name, Whakaari, is the peak of a huge submarine volcano rising more than 1,000 feet out of waters of the Bay of Plenty. The island is roughly 30 miles off New Zealand's north-northeast coast.\n\nThose who were on the island at the time of the eruption included nine Americans and 24 Australians. Other visitors' home countries included China, Malaysia, Germany, the United Kingdom and New Zealand.\n\nThe work safety charges are not related to the response that ensued after the eruption, such as rescue and recovery operations. WorkSafe says it didn't investigate that part of the incident.\n\n\"Those actions may be the subject of other proceedings, such as a coronial inquest,\" the agency says.\n\nCopyright 2020 NPR. To see more, visit", "pred_label": "__label__1", "pred_score_pos": 0.9023974537849426} {"content": "OUR SITE (“OUR SITE”) respects the intellectual property rights of others and expects its users to do the same. In accordance with the digital millennium copyright act (“dmca”) of the united states of america, and the european union copyright directive (“eucd”), OUR SITE will respond expeditiously to claims of copyright infringement committed using the OUR SITE service and/or the OUR SITE website (the “site”) if such claims are reported to OUR SITE’s designated copyright agent identified in the sample notice below.\n\nIf you are a copyright owner, authorized to act on behalf of one, or authorized to act under any exclusive right under copyright, please report alleged copyright infringements taking place on or through the site by completing the following dmca/eucd notice of alleged infringement and delivering it to OUR SITE’s designated copyright agent. Upon receipt of notice as described below, OUR SITE will take whatever action, in its sole discretion, it deems appropriate, including removal of the challenged content from the site.\n\nShare this\nnipple clothespinshouse wife hand jobshy girl masturbateshot girl takes a bathannamolli machinesellyour sextapehey_gem chaturbatekokette 22mechamusume videospricillamoonindiian_sweet chaturbatelesbians changing roomchaturbate freecamsamber hahn sphlovely lilith groping sisteradorkableariagiaaaa chaturbatechaturbate animenestarootzcreampie at workzoey_woods chaturbateravendivinetunderose videosdulcemariaa pornarielepeach mfcbluereign mfcarabelle dick drainersava addmasnicolle_bunnyholy_crap_sexxxualpeekmisstresciaraadelinasuperdillion harper brothermilk chaturbatebars_377 pornjulia denis pornfreakywifeandhusbmissy_93naughtysoulmatescute girl squirtsamandarox videosgatika_kalienteannabellerogersamateurs gone wilsamateur sucksholothewisewulffraerileydefiant desinot my equal xxxnikki sims new videosadrey_lili_hazeclarita1cum in her eyesloud moaning wifealicexmaia mfcbarbie0406kipsy420 vidsqueenluxe camblue_mooncatkawaii girl povporntrex lesbiansexy_b0rsch pornladyts007pentyhosechloe_kittywebcam thongsslimmsexx69spellbound kiss part oneember reigns videospurple bitch hinata", "pred_label": "__label__1", "pred_score_pos": 0.7158559560775757} {"content": "OtherPeoplesPixels Interviews Jackie Milad\n\nIt Means Desert, Desert (2020). Installation view. Photo credit: Vivian Doering\n\nJACKIE MILAD thinks of her layered, mixed media works as time-based art. She employs layering as a strategy to protect, hide and transform recurring symbols like eye, snake, brick wall, and breast. She cuts and draws and paints and sews, cannibalizing previously-exhibited works to make new works. A part of one piece becomes the beginning of another. This ongoing, ever-evolving process of creation refuses the notion of artworks as static, archival objects. Jackie earned her BFA at the School of the Museum of Fine Arts at Tufts and her MFA from Towson University. In 2019, she was named a Janet & Walter Sondheim Prize Finalist and a Robert W. Deutsch Foundation Ruby Grantee. Recent solo exhibitions include: Chaos Comes and Goes (2019) at C. Grimaldis Gallery (Baltimore), Portate Bien (2020) at Langer Over Dickie (Chicago) and It Means Desert, Desert (2020) at Julio Fine Arts Gallery (Loyola University, Maryland). Only three days left to see her work in Re-Materialize at Arthur Ross Gallery at the University of Pennsylvania (Philadelphia). It closes on December 20, 2020. Jackie lives and works in Baltimore City, Maryland.\n\nOtherPeoplesPixels: When I say the word layers, where does your mind go?\n\nJackie Milad: History. Ancestors. Information. Hidden. Protected. Removable or changeable.\n\nNope, No Way (2019) Mixed Media Collage on Paper. Photo credit: Vivian Doering\n\nOPP: Who are your artistic ancestors? \n\nJM: It was during undergrad at SMFA where I was first introduced to Performance Art and was really inspired by the work of women performance artists of the 60s and 70s and in particular: Yoko OnoAdrian PiperJoan Joanas and Valie Export. It was their fearlessness and vulnerability I was drawn to and how they used their bodies to examine and critique the politics of othering and to deconstruct power structures such as white supremacy and patriarchy. Other influences include Howardena Pindell and Jack Whitten for their textural mixed media works and their processes. \n\nI love maximalist audio and visual experiences, it's hard to narrow it down because there is so much out there from mainstream pop culture to experimental work—however, my absolute favorite movie is Dario Argento's 1977 Suspiria, for its garish lighting and beautiful compositions. I also really love the synchronized dance sequences in Busby Berkley films of the 1930s for the extravagance of it all.\n\nChaos Eyes Redux (2020) Mixed media. 72\" x 72\"\n\nOPP: You use recurring formal strategies like transparency, overlapping and reusing parts of old work to make new work. How do these serve your conceptual interests?\n\nJM: Layering is a vital element in my work. Every layer shows a new choice; it’s a record of my decisions. History is a complicated thing; it is almost always told from the perspective of the dominant power. Showing the history of my hand is a way to tell my own story, my own history. I also dig back into the layers or cut and paste older works to reveal the past. My work is personal, and some of the layerings are meant to reveal and later protect or hide information. \n\nAdditionally, I think a lot about how works of art are read. There is a general expectation that the work will be broken down into basic and understandable codes, whether by the artist themselves a writer, or by a curator. I like to defy this expectation by stacking layers, mixing up multiple signals, codes, and even languages. I rarely give it away. I want people to understand and accept that not everything has to be for them, not all symbols have to be revealed and explained—and sometimes it can be confusing and left a mystery.\n\nThe Flood Six - Hyena (2018) Acrylic, flashe, marker and collage on paper. 50\" x 42\"\n\nOPP: Do you think of your mixed media collage works as representing some kind of space, be it physical, mental or social?\n\nJM: I think of them as representing all of the above, or more accurately a record of time within the physical, mental, and social-political spaces. It takes time for me to layer the works, the pieces do not have an endpoint or finish point—they are more of an ongoing ever-changing, malleable record of my hand, my decisions, and of my observations of those things outside of my control. Ideally, in my studio, I am cutting from one piece to add to another in a fluid ongoing intuitive process. I compare them to doing performance art or time-based work.\n\nOPP: How do you think about the works that you’ve sold or gifted in terms of being ongoing?\n\nJM: Once the works leave my studio, they become out of reach or off-limits for obvious reasons. In a way, the objects become something else, they become more of a document or remnant of the performance/process. It would be amazing to one day collaborate with a collector to have work returned to my studio so that a piece could have another life yet again... and again and so on.\n\nYallah Sim Sim (2020) Video. 4 minutes.\n\nOPP: You use a pastiche of found and created imagery in Yallah Sim Sim (2020), a digital animation with the feel of a sacred dance party. Many symbols have been accumulating meaning for most of human history—pyramid, eye, snake, tear drop—and you use them in a way that is completely idiosyncratic. Tell us about the combinations of images and sound in this work.\n\nJM: I did this video in collaboration with my spouse, Tom Boram. We worked on this video after a research trip to my father’s homeland of Egypt in January. Going from ancient site to ancient site, and seeing a repetition of pharaonic symbols, but more importantly, the confluence of many cultures and epochs on one surface was very inspiring. The video recreates the experience of seeing the layers of Egyptian history competing with wayward touristic signs, a far-off Pizza Hut sign, or a booming car stereo playing mahraganat (Egyptian electronic dance music). This is really on point with what I’m getting at in my own 2D works In this video piece— information collapses onto itself in a chaotic pop kind of way. The writing is literally on the wall of tombs built for ancient pharaohs, turned Coptic monasteries, turned mosques, turned touristic sites. One fascinating architectural example is the pharaonic Luxor Temple which the Romans converted and renovated to be a church, and then later Arabs literally built a mosque (still in use) on top of the ruins of both the church and temple.\n\nUntitled (2019) from Chaos Comes and Goes\n\nOPP: Can you talk about the untitled golden necklaces works from 2019? The composition and palette in these predominately black works is so paired down compared to most of your recent work.\n\nJM: This piece and the other work in this series were done as a counter to the larger collage works. I have several works in which I single out one pattern or theme. I like the idea that a viewer can get a very unfiltered view of a symbol that is repeated and layered throughout my larger dense pieces. I think of the series as a map key to the other work.\n\nQuarantine One-a-Day Drawings (2020) 7\" x 7.\" Photo credit: Vivian Doering\n\nOPP: Tell us about your quarantine experience. It included making a drawing a day. How were these works generated by the early days of the pandemic.\n\nJM: Ah, quarantine. Well, I live with my husband, two dogs, and my nine-year-old son. At the start of the lockdown with schools closing and our jobs going entirely online, there was no time or energy to work in the ways I did pre-Covid. Going to my studio seemed impossible, so to maintain momentum and some mental stability I cut up some small 7” square paper and started drawing, but of course, was regularly interrupted, so what I thought would be these quick simple sketches turned out to take all day to make. This slowing down of my process was important to do at the time. I needed to slow down and be okay with it. I’m not actively doing the quarantine drawings anymore, I’m back in my studio, but I do have plans to go back to making them at some point.    \n\nGold Bars (2020) Mixed Media Collage on Hand-Dyed Canvas.\n\nOPP: What are you currently most excited about in your studio?\n\nJM: These days in my studio, I've been using the time to think and experiment with materials. Just yesterday I cut up a canvas piece that I've shown in an exhibition recently and started to reconfigure it by sewing other remnants and painting over it with a palette of colors I rarely use. The pandemic and the general stress of this year have made it hard to be consistently productive, so I am taking small steps to find a way forward—and sometimes that means a dance break in my studio or lying on the floor for a different perspective. \n\nTo see more of Jackie's work, please visit www.jackiemilad.com and follow her on Instagram @_jackie_milad_.\n\n\nOtherPeoplesPixels Interviews Szu-Wei Ho\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nOtherPeoplesPixels Interviews Luis Romero\n\n\n\n\n\n\n\n\n\n\n\n\nOPP: What role does optical illusion play in our work?\n\n\n\n\n\n\n\nOPP: Talk about your recent painted paper constructions. \n\n\nIn-progress work in the studio\n\nOPP: How are they both drawing and sculpture?\n\n\n\n\n\nOtherPeoplesPixels Interviews Diyan Achjadi\n\nDip, 2018. Ink and gouache on paper. 48\" x 60\"\n\nDIYAN ACHJADI uses painting, drawing and printmaking to investigate the visual languages and meanings of ornament and pattern. Informed specifically by the \"(mis)representations, (mis)translations, and imaginings of Indonesia,\" her works often include the hybrid animals of Javanese myth, references to historical textiles and dizzying mash-ups of pattern and popular imagery. Diyan has exhibited widely across Canada and beyond. Recent projects include a  year-long commission for the City of Vancouver Public Art Program called Coming Soon! and NonSerie (In Commute), part of How far do you travel?, a year-long exhibition on the exterior of public buses commissioned by the Contemporary Art Gallery (CAG) in partnership with Translink BC. A publication documenting Coming Soon! is available for purchase through the Contemporary Art Gallery. You can see Diyan’s work in the exhibition The Tin Man Was A Dreamer at the Vancouver Art Gallery through November 1, 2020. Diyan lives and works in Vancouver, Canada.\n\nOtherPeoplesPixels: What do you say to people who dismiss pattern and decoration as superficial?\n\nDiyan Achjadi: We need to constantly unpack the ways that we arrive at these types of judgements and recognize the implicit and explicit biases at play. Racism, sexism, and white supremacy inform, produce, and reproduce problematic notions of good and bad taste, as well as notions of \"real\" or \"superficial\" work. The dismissal of pattern and decoration is a form of reifying modernist European paradigms. We know that patterns can be deeply infused with symbolism and meaning. We also know the ornament and decoration as material history hold many clues as to the ways that images and information circulate and are reproduced. For instance, there's an ornamental cloud form that I often draw, based on a batik pattern found in Cirebon, a city on the north coast of Java, where some of my father's family are from. This pattern, called megamendung, is emblematic of this city and seen everywhere—on uniforms, as architectural detail, as wrapping paper, for instance. This cloud has similarities to cloud forms one might see on Chinese textiles or painted ceramics, which one could see as an artifact from centuries of international trade, exchange, and in the batik pattern is a synthesis of multiple cultural influences.\n\nUnfashioned Creature, Half Undone, 2015. Ink, gouache, and acrylic on paper. 62\" x 96\"\n\nOPP: Tell us about Creature Drawings (2015-2016) and Venationes (2014-2015). How do you employ mythic creatures to talk about both dissonance and harmony when the decorative languages of two cultures collide?\n\nDA: These two groups of works have slight differences. In Creature Drawings, I wanted to explore spaces of hybridity, where there's not a fixed understanding of place, time or logic and to imagine a space where different forms of visual language that are often seen as not belonging together co-exist and build off of each other. The creatures become a way of articulating a personality or narrative within this space. For instance, the title of Unfashioned Creature, Half Undone is a line from Mary Shelley's Frankenstein, which was a way for me to allude to questions of hubris. Back and Forth has a two-headed monster (acknowledging that the idea of the monster is also culturally loaded) going in opposite directions simultaneously, resulting in stasis. In these works the creatures are explicitly fictional.\n\nVenationes (after __ , after ___), 2014. Lithography. 49.5 cm x 38 cm\n\nOPP: And what is different in Venationes?\n\nDA: I was responding to a 16th Century book that was meant to be factual but included images of dragons and unicorns within the volume as if they really existed. I was doing some research on how Europeans imaged animals from Asia in printed matter, which led me to a book about hunting games.\n\nThe creatures in this series of prints are more about trying to understand the ways that we value certain parts of non-human animals as valuable or precious—such as tusks—and the violence in that gesture.\n\nJava Toile, 2015. Toner Print on Tyvek. 9 sheets, each 144\" x 40.\" Photo credit: Paul Litherland\n\nOPP: What does Toile de Jouy mean to you?\n\nAD: The patterns associated with Toile de Jouy, with its intricate lines and drawings, were made possible through advancements in printing technologies. So, from a printmaker's perspective, they've always held a place of interest for me. As a form of decoration, I have also been fascinated by the types of scenarios that are often portrayed in these patterns, such as European pastoral tableaus and fantastical Chinoiserie landscapes. The form is also tied to imperialism and colonialism, from the aspects of production to the images portrayed and the spaces that these patterns would populate.\n\nJava Toile (detail), 2015. Toner Print on Tyvek. 9 sheets, each 144\" x 40.\" Photo credit: Paul Litherland\n\nOPP: Tell us about the new content that you have injected into this old pattern in False Creek Toile (2016) and Java Toile (2015).\n\nAD: For Java Toile, I began the project by thinking of the extinction of non-human animals that used to populate the island of Java, where I am from. I wanted to make links between that extinction and land exploitation, commerce, capital, and tourism. The drawings respond to  archival images, postcards, news images, ceramic figurines, and photographs that I've taken on my trips back home. For False Creek Toile, I was thinking of lost landscapes in parts of Vancouver that were once water, but have in the past century been filled and are now asphalt and concrete.  \n\nRailway + Jackson site, August 2018. Photo credit: Harry Armstrong\n\nOPP: Your recent project Coming Soon! (2018-2019), commissioned by the City of Vancouver Public Art Program,is visually distinct from previous work. Is this a new direction or an outlier? Or did the project grow naturally out of previous works?\n\nAD: I’m not sure if it's a new direction or an outlier! While it looks different visually than many other works that I've exhibited, it was made concurrently with drawings such as Sinking or Dip. Some of the core aspects of the project—questions of value, labour, time, craft—are a consistent thread throughout my practice. I have also always had an interest in art that circulates beyond traditional white-cube gallery spaces, whether in domestic contexts, ephemeral posters, or animations made for public spheres. The project also grew out of a desire to spend more time in the print studio. I teach printmaking and am very immersed in its techniques, contexts, and history, but so much of my recent work has been in drawing. I wanted to make a concerted investment into these techniques and make printmaking visible in my practice in a way that I don't think I have before. \n\nThe history of printmaking as a mode of distribution is intimately intertwined with the technologies of image and text reproduction. I was curious to make a public project that was anachronistic, where its modes of production used processes that were once considered quick and impersonal, but now are seen as rarified and craft-centric. I also wanted to invite passers-by to pause at what they were seeing. The works were all posted or pasted on temporary construction fences that usually have notices, advertisements, and the occasional graffiti. My hope is that passers-by will notice the prints and start to pay attention to what was happening behind these fences. In many ways I approach my drawings in a similar way, where I hope to invite a slowing down in the process of looking.\n\nAt the Moment They Collided, 2013. Ink, gouache, and silkscreen collage on paper. 22\" x 30\"\n\nOPP: How are you coping with life during a global pandemic? How is your studio practice being affected?\n\nAD: I’m very lucky in that I have stable employment and have continued to have work throughout this. I'm also very lucky to be in Vancouver at this time, where we are now finding ourselves in a slow, cautious, and measured reopening. I have been thinking through what it means to make things in the studio, and what and who I am making things for. To make pictures is always a strange activity, and now it seems even stranger than ever. With the isolation and changing social structures necessitated by the pandemic, I find myself wanting to work on things that give me a sense of connection, dialogue, and community. \n\nI've been working on a four-person drawing project that started just before everything shut down, with three friends and colleagues from graduate school—Ilga LeimanisMelissa Manfull, and Doreen Wittenbols—where we have been mailing drawings to each other, and responding to the previous person's mark making and imagery before sending it on to the next person. It's been really lovely to get these large drawings in the mail and be in dialogue with these three other artists through this process. I'm realizing more and more how much I value working collaboratively, and the challenges and joy in the process of figuring things out together. I've been making a few very short comics in response to assignments from another friend, which have stretched me to think through narrative and storytelling more deliberately. I'm also beginning a new animation that will use some small, intimate watercolour drawings made in the past few months as its starting point.\n\nTo see more of Diyan's work, please visit www.diyanachjadi.com.\n\n\nOtherPeoplesPixels Interviews Seth Goodman\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nTo see more of Seth's work, please visit sethgoodman.net.\n\n\nOtherPeoplesPixels Interviews Michael Zachary\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nOPP: What are the sources for your landscape drawings?\n\n\n\n\n\n\n\n\n\n\n\n\n\nTo see more of Michael's work, please visit drawsoftly.com.\n\n\nOtherPeoplesPixels Interviews Jeff Krueger\n\nFailure is an Option, 2017. Installation view.\n\n\n\n\nGhosts, 2017.\n\nOPP: Talk about the abstract visual language you work with.\n\n\n\nOPP: Can you give us a specific example of that?\n\n\n\n\n\n\nInfinity is King, 2017.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nTo see more of Jeff's work, please visit jeffskrueger.com.\n\n\nOtherPeoplesPixels Interviews Rachelle Reichert\n\nBackwardFuture, 2017. Installation shot, Black Crown Gallery. Photo credit: Phillip Maisel.\n\nRACHELLE REICHERT's sculptural forms are minimal and her palette is monochromatic—almost exclusively black, white and grey. These formal decisions grow directly from her material choices—graphite and salt. Underlying the seemingly-simple, formal elegance is a committed interest in the social and ecological impact of technology. Rachelle earned her BFA at Boston University, following by her MFA at Mills College (Oakland, CA). In addition to numerous solo exhibitions, she has presented her work at the California Climate Change Symposium, the State of the San Francisco Estuary Conference, the American Geophysical Union Meeting. Her work will be on view from September 9 - October 21, 2018 in the group show Unwalking the West at the Center for Contemporary Art & Culture at Pacific Northwest College (Portland, Oregon). Rachelle is curatingTrace Evidence: A Cross-Cultural Dialogue on Climate Change in affiliation with Global Climate Action Summit in September 2018. The show opens at Minnesota Street Project (San Francisco) on September 5, 2018 and will be accompanied by a panel discussion sponsored by SFMOMA on September 11, 2018. Rachelle lives and works in the San Francisco Bay Area, California.\n\nOtherPeoplesPixels: Why are salt and graphite the dominant materials in your work? How do they drive your work?\n\nRachelle Reichert: I am interested in the familiar becoming unknown and in the complexity of seemingly ordinary things. My practice explores the connection between basic natural materials, their use by industry and technology and the resulting impact on the environment and culture. I have created work with metal, clay, natural pigments, charcoal and more. But graphite and salt have held my attention for over five years.\n\nGraphite is a primary tool for drawing— a practice that helped develop human consciousness. Graphite was originally used by sheepherders to mark sheep. Since then, it has a history in industrialization as a lubricant to machinery and now in the lithium-ion battery found in cars and  smartphones. Graphene—graphite’s 2-D form—is enabling leaps in nanotechnology and biotech because it is an excellent superconductor. I research the life cycle of the material, from extraction to implementation and create artwork based on this research.\n\nFirst Rains, 2016. Salt. 15 x 12 x 9 in each.\n\nOPP: And salt?\n\nRR: I started thinking about salt in 2013 in my first semester of grad school. I had an incredible professor, the late Anna Valentina Murch, who encouraged material experimentation in sculpture when I was making large graphite paintings. She helped to transform my thinking. Salt has been extracted industrially from the San Francisco Bay since the 1850s. It is an incredibly unstable mineral that is essential for human life. Like graphite, I’ve researched salt’s use in industry, such as local extraction and the repercussions shaping the San Francisco estuary. In addition I have studied salt’s role in culture, such as its use in woman-led pagan practices that were later adopted by Catholicism. My salt circles come directly from that.\n\nBoth graphite and salt are extracted all over the world. Presently, I am looking at graphite extraction in China and I recently returned from the Salar de Uyuni in Bolivia, the largest salt flat in the world with the largest reserves of lithium.\n\nExhibition at Monterey Peninsula College, 2017\n\nOPP: How do you make formal choices to support your conceptual concerns?\n\nRR: My forms and palettes are determined by the materials themselves. I am sensitive to the textures and forms of the materials. That is where the complexity lies. These works are demanding and require close looking. Unfortunately, photographs of the works don’t communicate this well. \n\nOPP: How do the forms grow out of the material? It’s clear in the saltworks, but what about the hexagons, for example?\n\nRR: The hexagons reference the crystalline structure of graphite, an allotrope of carbon. It’s the hexagonal form that allows for the superconductivity of the material. A beautiful example of form follows function.\n\nUntitled (Hexagons 3), 2018. Graphite on panel. 50 x 24 inches (variable).\n\nOPP: Is the sourcing of your materials important?\n\nRR: Yes, very important. It creates the content for some works. I often harvest my own materials or when I can’t do it myself, I work with companies who do and build relationships with these companies. I often watch sights for a very long time, years usually, before I start making work. Watching includes tracking locations via satelite images and reading news, geological reports, surveys or any information I can find and visiting the locations—if I can. \n\nCurrently, I am working on a project where I’ve been visiting locations in California impacted by forest fires and making oil paint from the charred trees. I started this in 2014 but it is just now that I am making paintings. The fires have accelerated rapidly in the time I’ve been researching. I coincidentally started making this work during the largest recorded fire in California history, the Thomas Fire in December 2017. Since then, the Mendocino Complex Fire, burning as I write this, now holds the record as the largest fire. I am creating this work as it rains ash from the sky in San Francisco and grieving, like so many others, for a California past and for those who have suffered from these fires.\n\nBlackdragon Mine #15, 2017.\n\nOPP: What role does satellite imagery play in your drawing practice?\n\nRR: I use private-sourced earth imaging satellites to track locations affected by global warming. I have access to these images from a research ambassadorship. I track graphite mines with these images and salt evaporation ponds, wildfires and new sites of extraction in the American West. These images come from technology that could not exist without the raw materials that are being photographed and so I want to highlight that connection with my drawings.\n\nOPP: Are the Black Dragon drawings examples of this? Do viewers/critics ever miss the connection and want to talk abut these as pure abstraction?\n\nRR: Yes. The name comes from the mining group that I have been following in China. These works can function as pure abstraction or as an investigation of the images I am exploring and creating the works from. The connection is often missed, but I think that adds an interesting layer, potentially revealing the reference images in unexpected ways. Most people don’t realize that satellite images are highly edited—color corrected, cropped, composited—to look like what one would expect from a satellite image: a clear view of the land below with no clouds or blurs or camera malfunctions (remember, these images are coming from space!). The drawings are layered and space is negotiated in strange ways intentionally to reveal this. \n\nBlackdragon Mine #16, 2017. Graphite on prepared paper. 12 x 16 inches.\n\nOPP: You’ve presented your artwork at the California Climate Change Symposium, the San Francisco State of the Estuary Conference, and the American Geophysical Union Meeting. Can you talk about presenting art in a scientific context?\n\nRR: My research requires a lot of understanding into the chemical composition of my materials and how their uses impact the planet. I track pollution from extraction and man-made marks on our planet. I feel that art is an essential tool to help understand science, especially climate science. There is an urgency there and I am always seeking opportunities to intersect ideas and collaborate. \n\nTo see more of Rachelle's work, please visit rachellereichert.com.\n\n\nOtherPeoplesPixels Interviews Amanda Burnham\n\nNeighborhood Watch (installation detail), 2016. Acrylic, flashe, paper, cardboard, and LEDs. 5 vignettes, each approx. 10 x 10 x 5.'\n\nAMANDA BURNHAM's immersive, collage installations are dense with vernacular signage, brick walls and and trash cans. She pieces hundreds of gestural drawings of the surrounding city together, deliberately confusing three-dimensional space.  Instead of a realistic rendering of what a city looks like, she captures the frenetic energy of city architecture. Amanda earned her BA in Visual and Environmental Studies, at  Harvard University and her MFA in Painting and Printmaking at Yale University. Her long and varied exhibition record includes recent solo shows at University of Baltimore (2017), Elon University in North Carolina (2017), Arlington Art Center in Virginia (2016) and Dittmar Gallery at Northwestern University in Chicago (2014). Her work is included in the permanent collections of National Museum of Women in the Arts (Washington, DC) and the New York Public Library, as well as various private collections. Amanda just completed the Antenna Projects Artist Book Residency in New Orleans, and her solo show Amanda Burnham: In Situ will open at Gershman Gallery in Philadelphia on September 6. Amanda lives and works in Baltimore.\n\nOtherPeoplesPixels: Your drawings and installations are all about cities. What’s your favorite city in the world?\n\nAmanda Burnham: There are many cities that I love, but I'm going to go with Baltimore—not only because I live here, but because of its rich, diverse architectural vernacular, history, neighborhoods, and challenges. It inspired the direction of the installation work I have been making for the last decade.\n\nBetter Waverly, 2014. Paint and paper. \n\nOPP: Tell us about the first installation?\n\nAB: The first installation I made was for a show at the Julio Gallery at Loyola University in Baltimore in 2008. I'd been asked by the curator to show a group of the plein air cityscape drawings I'd been consumed with making at that point. I'd made hundreds of these small observational drawings of different sites during my first full year in the city. It started as a way of getting to know my new surroundings. I'd begun to feel the limitations of working at a small scale, from a fixed perspective. I increasingly felt that it wasn't the best way to capture the energy and activity of the city as I came to know it while sitting for many hours drawing it. I asked the curator if she would be open to me creating an installation for the show to accompany my drawings, and, thankfully she was. Looking at back at the resulting work (which, at the time I was very proud of, and which was very freeing for me), I'm struck by how minimal and reserved it is. But it changed the direction of my practice entirely.\n\nEdmondson Avenue, 2009. Ink on paper. 9 x 12.\"\n\nOPP: Earlier drawings are more realistic renderings of city landscapes, but it seems like you have been drawing in a more illustrative, comic style lately, especially in the installations. What led to this shift?\n\nAB: Lately I've been interested in broadening the parameters of my work, so that it is less defined by a visual shorthand that references the built environments of urban spaces. I want it to be more inclusive of imagery that also suggests all the activity that occurs within those spaces. What really draws me to cities, anyway, is the events that happen when our living circumstances are not isolated and homogenous and the way they enable people to collect/collide/interact. \n\nThe somewhat comic stylistic approach of my drawings allows me to incorporate ideas which are less literal and strictly visually descriptive. I like that a comic style, given its bold, graphic qualities, allows me to formally weave together imagery from a lot of really different places—objective, inventive or visionary, metaphoric, etc.\n\nIn the Weeds (detail), 2016. Acrylic, flashe, and paper. 10 x 72.'\n\nOPP: Tell us about the process of creating these drawing installations? Are they site-specific? What determines the imagery?\n\nAB: They are always site-specific in the sense that they are constructed almost entirely within the space they will be shown, and are therefore sensitive to the physical peculiarities of whatever that space is. They are often site-specific in the sense that I choose to enfold imagery discovered in the surrounding area to some degree. I've done this in very subtle ways, and I've also built entire pieces that were meant to evoke a specific city (as with RFP in Baltimore). \n\nI start by looking at the space and by collecting imagery from which to make drawings. I walk around the neighborhood, take pictures and make sketches. Using my sketchbook, I establish parameters for the piece, ideas I want to address or imagery I want to incorporate and roughly how I will engage the space. I sketch out broad compositional outlines for shape on the wall, where I want collage layers to be massed, palette, whether there will be sculptural components or embedded lighting. \n\nI'll spend the weeks leading up to making a piece preparing raw materials for collage. I roll out drawing paper in my studio, prepare it with color (watered down acrylic, usually), and make hundreds of quick gestural drawings with black acrylic. When I put the piece together in the space, I take anywhere from a day or two to several weeks. Everything is orchestrated very extemporaneously within the parameters I've set. I use different widths of black or colored masking tape and light duty staples to attach pieces to the wall, and sometimes paint directly on the wall, as well.  The final pieces are the result of many layers of collage build up. \n\nHigh Winds, 2011. mixed media\n\nOPP: You mentioned RFP, which was a unique installation in that it involved audience participation. What does RFP stand for?\n\nAB: RFP stands for Request for Proposals. Its a term commonly used in city planning for the development of a parcel of land. I wanted to evoke this common usage because Baltimore—like most older, formerly industrial cities—has a fraught and lengthy history with issues surrounding planning. There are neighborhoods with legacies of exclusion borne by restrictive covenants and red-lining, division and isolation of formerly thriving neighborhoods via poorly considered large scale building projects (like highways), disinvestment and civic neglect of neighborhoods (frequently along racial lines), gentrification that prices long term residents out of their homes and established communities. A commonality to all these dynamics is how bound up they are in bureaucratic and political structures that can seem far from the reach or control of the individual citizens that they impact. \n\nRFP was motivated by an idealistic desire to propose a city democratically shaped in every way by the people who actually live there; it was a request for proposals from the residents of Baltimore.\n\nRFP, 2015. Paper, paint, cardboard, tape, lumber, lights. 2015\n\nOPP: How did the installation evolve?\n\nAB: The piece as it opened on day one was like my other work in its use of paper and collage installation. All of the drawings were recognizably Baltimore; different neighborhoods were woven together throughout the space, commingled without reference to literal geography.\n\nI wanted the piece to feel very welcoming. The piece was orchestrated in a large ground floor former department store space with huge, plate glass windows in front. It was located on West Baltimore Street, an area of the city which a lot of different people traverse for a lot of different reasons every day. In addition to having numerous hand drawn OPEN signs (like the neon ones you see in bodegas) and a sandwich board inviting people in from the sidewalk, I designed the piece so that it would be maximally visible from outside. It stretched all the way to the front so there wasn't any apparent barrier to entry (like the imposing desks that sit at the front of most galleries). All of this was meant to be a reflective backdrop, and the centerpiece of the installation was a big table full of drawing supplies and some loose prompts inviting thought about Baltimore: \"I feel the most like I belong here when...\", \"This city needs...\", \"My neighborhood is...\" etc. \n\nVisitors were invited to add their writings and drawings to the existing backdrop. During the time the piece was up, more and more of these amassed, so that by the time it came down it was covered with hundreds of contributions, ranging from reminisces, to suggestions, to manifestos, to actual images altering the preexisting ones. \n\n\nOPP: Was there anything frustrating about depending on the public to complete the work? What was satisfying about it?\n\nAB: Not in this case. We had a large volume of visitors due to the visibility from the sidewalk and the high traffic in the area. The piece was set up so that it would be clear to someone that contributing was the idea without having to ask. The paper on the table was color keyed to the backdrop, in addition to the rolls of tape and drawing supplies were visual cues, and this seemed to work (though I was on hand every day to greet people and answer questions if they had them, too.) There was some initial anxiety that it wouldn't work, or that I'd have to edit contributions (i.e. if someone posted something abusive or hateful), but wonderfully, there was no need. \n\nSince I was there everyday, I met a lot of people over the course of the piece's life. As satisfying as it was to see (and be surprised by!) the range of physical additions to the piece, the most satisfying was that the piece became a way for me and other visitors to talk to people we might never have met otherwise.  \n\nTo see more of Amanda's work, please visit amandaburnham.com.\n\n\nOtherPeoplesPixels Interviews Florine Demosthene\n\nReleasing the Truth, 2018. Mix media on canvas. 32 x 48 inches.\n\nThe female figure in FLORINE DEMOSTHENE's mixed media work hovers in a gauzy, blue and gray haze. In some works, she sprouts whole other versions of herself from her back. In others, she lovingly carries herself in her arms or on her shoulders, as a parent carries a child. This figure represents our relationship with ourselves. She is both a physical body and a symbol of the spirit. Florine earned her BFA at Parsons the New School for Design and her MFA at Hunter College. She had had solo exhibitions at Caribbean Museum Center for the Arts (St. Croix, U.S. Virgin Islands), Gallery MOMO (Capetown and Johannesburg, South Africa), Semaphore Gallery (Neuchâtel, Switzerland) and Gallery 1957 (Accra, Ghana). She has received grants from Arts Moves Africa and Joan Mitchell Foundation. Florine resides between New York, Accra and Johannesburg, although she's spending 2018 in Tulsa, Oklahoma as a 2018 Tulsa Art Fellow.\n\nOtherPeoplesPixels: How do you see the relationship between the mind and the body, the internal and the external?\n\nFlorine Demosthene: The works are about the relationship we have with ourselves. . . the different parts of ourselves and how we are engaged in this continual battle. I have been investigating the duality between mind, body, emotion, spirit and essence through this series of works. I have not quite formulated a solid understanding of these components and how they interconnect. It's like I have gone down this rabbit hole that keeps getting deeper and more nebulous. \n\nDisappear Into Myself 3, 2013. Ink, charcoal, graphite and oil bar on polypropylene. 9 x 12 inches.\n\nOPP: It seems like you are really talking about a spiritual path of inquiry. How does art-making aid in that path? Can you share any insights or observations you have?\n\nFD: Making art in integral to my path of self-awareness and discovery. It allows me to create a cocoon around myself where I can delve deeper into my psyche. It has been an intriguing journey. I find when I allow my anger to rise to the surface, I make leap and bounds in my art work. I don't want to be in a perpetual state of rage, but it does serve as a catalyst for me to push past my boundaries.\n\nIllumination #11, 2018. Collage on paper. 11 x 14 inches.\n\nOPP: Are these works self-portraits?\n\nFD: I don't necessarily see the works as self-portraits but rather an exploration of ideas. I reference myself, particularly my body, because it is readily available and I can easily manipulate it in the way that I want. \n\nOPP: Can you talk about Mind Chatter and The Story I Tell Myself? Is the secondary figure a burden to the first? Or simply an integral part that the main figure must nurture and carry through life?\n\nFD: Those two works are addressing the shadow aspects of who we are and what exactly constitutes our personal narratives. I find that we fear the darkness within ourselves and shy away from addressing that truth within us. With those two works, I was searching for how to unburden this aspect within us.\n\nMeta, 2018. Mix media on wood panel. 40 x 52 inches.\n\nOPP: Blue lines seem to operate differently in different works. In Meta, they grow from the fingertips and remind me of Freddy Krueger’s knife glove. In Wounds #2, they seem more like blood dripping and in Wounds #7, they shackle the feet. How do you think about the blue in these works?\n\nFD: Firstly the large areas of blues and black are glitter. The blue glitter lines are a continuation of the yellow beams that I was using in a previous series. These lines represent energetic communication or a sort of higher consciousness.\n\nThere has been this question that has been gnawing at me for quite some time: If we are only using like 10% of our brain capacity, then what would it look like if we say use 55%-100% of our minds? \n\nIn the quest to find answers to this question, I have come to the understanding that it is not about our brains, but rather our connection to our soul/essence/spirit...that spark that ignites the life within us. If we could gain full access to this spark, then we can propel the brain (and how it functions) to level unimaginable. The thing is, we are so disconnected from this aspect of ourselves. In these works (the ones with the radiating lines) I'm attempting to bridge that gap between mind and spirit. . . to somehow build a connection to allow for direct communication.\n\nTo Come Undone, 2018. Mix media on wood panel. 52 x 120 inches.\n\nOPP: In earlier works, the figure feels trapped in the backgrounds because there is more visual noise and, in some cases, actual locations with buildings and furniture. But in more recent works, the figure seems to be floating in an empty, abstract space. Can you talk about this change?\n\nFD: The simplified background was just a natural progression of the work. In earlier works, I was concerned quite a bit with the figure/ground relationship. As the series developed, it became more and more about the body—and what's within the body—and less about the space in which the figure resides. This gradual shift helped me to hone in a bit more on what I wanted to convey with these drawings and paintings.\n\nMeta-Two, 2018.  Collage on canvas. 36i x 48 inches.\n\nOPP: In 2018, you won the Tulsa Fellowship, which offers an unrestricted award and brings artists from elsewhere to Tulsa for a year. Tell us about the experience. What has it been like to relocate? And what are you working on?\n\nFD: I have been out of the USA for four years, so I had to mentally adjust for this fellowship. Thus far, the fellowship program has been surprising (in a good way) and it is allowing me to have some much needed time to regroup. I plan on continuing this series as well as possibly incorporation 3D and digital works. . . but we shall see how that goes. \n\nTo see more of Florine's work, please visit florinedemosthene.com.\n", "pred_label": "__label__1", "pred_score_pos": 0.9622696042060852} {"content": "Anthraquinone synthesis gene in plants identified!\n\nAnthraquinone synthesis  gene  identified!\n\n\nNew work from an international team of scientists reveals a gene responsible for anthraquinone synthesis in plants. Their findings could help scientists cultivate a plant-based mechanism for harvesting these useful compounds in bulk quantities.\n\n\"Senna tora is a legume with anthraquinone-based medicinal properties that have long been recognized in ancient Chinese and Ayurvedic traditions, including antimicrobial and antiparasitic benefits, as well as diabetes and neurodegenerative disease prevention,\" the author explained.\n\nDespite its extensive practical applications, genomic studies of Senna have been limited. So,  the research team used an array of sophisticated genetic and biochemical approaches to identify the first known anthranoid-forming enzyme in plants.\n\n\"Now that we've established the first step of the ladder, we can move quickly to elucidate the full suite of genes involved in the synthesis of anthraquinone,\" said lead author.\n\nOnce the process by which plants make these important compounds is fully known, this knowledge can be used to engineer a plant to produce high concentrations of anthraquinones that can be used medicinally.\n\n\"The same techniques that we use to help improve the yields of agricultural or biofuel crops can also be applied to developing sustainable production methods for plant-based medicines,\" the author concluded.", "pred_label": "__label__1", "pred_score_pos": 1.0000061988830566} {"content": "For the 2020-2021 season, our team will have Project Leader positions in addition to the Division Coordinators. Any Division Coordinator may seek self-nominations for a specific Project Lead position within their Division.\n\nThe project leaders will work closely with their corresponding division coordinator in managing the progress of the certain project he or she is in charge of. Some responsibilies of a project leader may include planning, attending and/or documenting project meetings. In the case that the division coordinator is unable to attend a meeting, project leads may also be able to serve as a proxy.\n\nIf members have any projects they are interested in leading, they should reach out to the leadership team and their respective department coordinator!", "pred_label": "__label__1", "pred_score_pos": 0.9028787016868591} {"content": "CMStatistics 2017: Start Registration\nView Submission - CMStatistics\nTitle: Modeling a complex multi-state warm standby system with loss of units through a D-MMAP Authors:  Juan Eloy Ruiz-Castro - University of Granada (Spain)\nMohammed Dawabsha - University of Granada (Spain) [presenting]\nAbstract: In reliability literature it is usual to consider the replacement of a unit which has undergone a non-repairable failure in a negligible unit of time. A complex multi-state warm standby system subject to different types of events, internal and accidental external failures, inspections and preventive maintenance is modeled by considering a discrete Markovian arrival process with marked arrivals. The system is composed of a finite number of units, including the main one and the others in a warm standby. When a non-repairable failure occurs and the system can keep on working, the unit is removed and the system continues working with one unit less. If all units are removed, the system is then reinitialized by considering a new identical one. The number of repairpersons depends on the number of units in the system. Inspections have place randomly and if the observed online unit is worn out, then it goes to preventive maintenance. Different repair times are considered for corrective repair of the online unit, warm standby units and preventive maintenance. The system is modeled and the transient distribution is determined. Some reliability measures of interest are calculated. Rewards and costs are included. A numerical example illustrates the model.", "pred_label": "__label__1", "pred_score_pos": 0.7589356899261475} {"content": "Welcome to China BNP ozone technology Co., Ltd\n\nOzone Generators | China BNP ozone technology Co., Ltd\n\nPreferred supplier of ozone system\n\nTEL: 15818868390\n\nYou Position::home»News»Questions»Glossary of terms related to ozone\n\nGlossary of terms related to ozone\n\nAuthor:www.dahuan.net Views:date:2019-01-14 09:56\n\nOzone production: is the yield of ozone, the amount of ozone produced in hours. Unit of measurement: mg/h, g/h, kg/h. Concentration × flow rate\nOzone concentration: The amount of ozone per unit volume. Unit of measurement: mg/L, mg/m3, ppm\nWater soluble ozone concentration: Ozone is dissolved in water, the ozone content per unit volume. Unit of measurement: mg/L, ppm\nOzone concentration for air application: The concentration of ozone used for air disinfection is generally 1-10 mg/m3.\nEnvironmental ozone concentration: The concentration of ozone contained in the ambient air, the environmental quality standards specified in the environmental quality standards are 0.12/0.16/0.2 mg/m3.\nPower consumption: The power consumption of the ozone generator unit for every 1kg of ozone generated without the air handling system. (This unit is an indicator for evaluating the performance of the ozone generator, which is different from the power of the equipment). Unit of measurement: kwh/kgO3\nAddition amount: The amount of ozone added to a certain unit of liquid or gas. Unit of measurement: g/m3, g/T\nProduction of unit discharge area: The amount of ozone generated per unit area of ​​the discharge medium, which is an indicator for evaluating the performance of the discharge medium. Unit of measurement: g/m3\nDew point: is an indicator of air dryness. At what temperature the air begins to dew condensation. Unit of measurement: °C.\nInlet Air Flow: The amount of material gas entering the ozone generator discharge chamber per hour. Unit of measurement: m3 / h\nExhaust flow: The flow rate of ozonated mixed gas per hour from the generator discharge chamber. Unit of measurement: m3 / h\nIntake pressure: The pressure of the material gas entering the discharge chamber of the ozone generator. Unit of measurement: MPa\nPhotochemical generation of ozone: A method of decomposing and polymerizing oxygen molecules by ultraviolet light to form ozone.\nChemical Ozone Production: A method of electrolyzing an oxygen-containing electrolyte to produce ozone using a DC power source.\nCorona discharge method: A method in which an alternating oxygen high-voltage electric field is used to generate a corona discharge of an oxygen-containing gas, and a high-energy free electron in a corona dissociates an oxygen molecule and polymerizes to form an ozone molecule.\nAir gap discharge method: A type of corona discharge in which a discharge region occurs in a region between a dielectric layer and a high voltage electrode or a low voltage electrode.\nFringe discharge method: A type of corona discharge in which a discharge region occurs at the edge of a high voltage electrode.\nDTA Discharge Body: An enamel is the main dielectric ozone discharge body with high output and high concentration.\nElectrode: A conductive portion that forms a conductive interface with a medium having a different electrical conductivity, and an electric conductor that distributes a high voltage electric field in the ozone generating unit.\nMedium tube (plate): The basic electromagnetic field performance is a component composed of a substance polarized by an electric field. In the ozone generating unit, it is located between the two poles, resulting in a stable glow. Light discharge insulator.\nDielectric Barrier Discharge: A gas discharge phenomenon caused by an alternating voltage applied and raised in an electrode and a discharge space blocked by a dielectric.\nMedium strength: The highest electric field strength that a dielectric material can withstand without being damaged.\nOzone generating unit: constitutes the most basic component for generating ozone, such as an ozone generating unit that discharges with a corona air gap as a high voltage electrode, a ground electrode, a medium, and an air gap.\nOzone generating unit: The basic component for generating ozone, consisting of a dielectric body and an electrode and a discharge space separated by it.\nOzone generation room: A device consisting of one or more groups of ozone generating units\nOzone generator: A device necessary for the production of ozone by oxygen or air through a dielectric barrier discharge.\nOzone system: Part or all of the equipment combination of ozone generator, gas source device and contact reaction device.\nStandard state: The gas state at a temperature T = 273.15 K (0 ° C) and a pressure P = 101.325 kPa (standard atmospheric pressure).\nOzone:O3, composed of three oxygen atoms, is a trace component of the natural atmosphere, with an average content of 0.1-0.01 ppm, most concentrated in the stratosphere of 10~30km, tropospheric ozone Only 10%. If at zero degrees Celsius, the ozone in the atmosphere is compressed to an atmospheric pressure in the vertical direction, the thickness is only about 3 mm, which is equivalent to the thickness of two 5 cent coins stacked together. The chemistry of ozone in the Earth's atmosphere plays a very important role in maintaining the Earth's energy balance and ecological balance by absorbing solar radiation.\nOzone Layer:Ozone Layer, the atmosphere that concentrates most of the ozone in the atmosphere in the stratosphere.\nOzone depletion: Ozone Depletion, the ozone concentration in the ozone layer is in a dynamic equilibrium, maintaining a certain concentration, and the ozone concentration in the ozone layer is reduced due to other reasons, called the ozone layer loss.\nAntarctic Ozone Hole:Ozone Hole, observed in the 1980s, since the end of September each year, the total amount of ozone over Antarctica has been rapidly reduced by about half, in the center of the ozone layer over the polar region, nearly 90% of ozone It is destroyed. If it is observed from the ground up, the high-altitude ozone layer is extremely thin. Compared with the surrounding, it forms a hole with a diameter of thousands of kilometers, called the “ozone hole”.\nD.U.: Dobson Unit, defined as 0°C, under standard sea level pressure, 10-5m thick ozone as 1 Dobson. The Dobson spectrophotometer used to measure Dobson units was used by the World Meteorological Organization as a standard measuring instrument. \"Total ozone\" refers to the total thickness of the ozone column, and describes the integrated height of the column density, expressed in centimeters (STP).\nTOMS:Total Ozone Mapping Spectrometer, an instrument equipped to measure global ozone concentrations on satellites\nODS:Ozone Depletion Substances, ozone depleting substances\nODP:Ozone Depletion Potential, the potential ability to characterize a substance causing ozone depletion. ODP is defined as the loss of O3 caused by a unit mass species divided by the O3 loss caused by the unit mass of CFC-11.\nGWP:Global Warming Potential, Global Warming Potential\nCFC:(Chlorofluorocarbon), chlorofluorocarbons\nUV-B:Ultraviolet-B, refers to ultraviolet light with a wavelength between 290 and 320 nm\nUV-C: refers to ultraviolet light with a wavelength between 320 and 400 nm.\nUV-A: refers to ultraviolet light with a wavelength of less than 290 nm\nSOD:Stratospheric Ozone Depletion, Stratospheric Ozone Depletion\nFreon:Freon, trade name for chlorofluorocarbons\nHalons:Halon, containing bromide\nFlocculation: In the chemical field, the colloid is suspended in the form of flocs or flakes. This effect differs from the precipitation in that the colloid is only suspended in the liquid and is practically insoluble in the solution prior to flocculation. In the flocculation system, no filter cake is formed because all flocs are in suspension\nAntimicrobial: A substance that kills or inhibits the growth of microorganisms [1], such as bacteria, fungi or protozoa. Antibacterial drugs can kill microorganisms (microorganisms) or prevent microbial growth (microbial inhibition). Disinfectants are antibacterial substances used in non-biological organisms.\nCorona Discharge: This is the most popular type of ozone generator for most industrial and personal uses. Although there are variations in the \"hot spark\" corona discharge method for ozone production, including medical grade and industrial grade ozone generators, these units typically operate through corona discharge tubes. [42] They are usually very cost effective and do not require an oxygen source other than ambient air. However, they also produce nitrogen oxides as a by-product. The use of an air dryer can reduce or eliminate the formation of nitric acid by removing water vapor and increasing ozone production. The use of an oxygen concentrator can further increase ozone production and further reduce the risk of nitrate formation by not only removing water vapor but also removing most of the nitrogen.\nUV Light: Ultraviolet Ozone Generator or Vacuum Ultraviolet (VUV) Ozone generator uses a source of narrow-band UV light, which is part of the sun. The sun's ultraviolet rays maintain the ozone layer of the Earth's stratosphere. Although standard UV ozone generators tend to be less expensive, [need to clarify] they typically produce ozone at a concentration of about 0.5% or less. Another disadvantage of this method is that it requires exposure of air (oxygen) to the UV source for a longer period of time and does not treat any gases that are not exposed to the UV source. This makes it impractical for the UV generator to be used in the case of handling fast moving air or water streams (eg, air disinfection in a pipeline). Ozone production is one of the potential dangers of UV germicidal radiation. VUV ozone generators are used in swimming pool and spa applications and range from millions of gallons of water. Unlike corona discharge generators, VUV ozone generators do not produce harmful nitrogen by-products, and unlike corona discharge systems, VUV ozone generators work very well in humid air environments. There is also generally no need for expensive exhaust mechanisms or air dryers or oxygen concentrators that require additional cost and maintenance.\nCold Plasma: In the cold plasma method, pure oxygen is exposed to a plasma generated by a dielectric barrier discharge. The diatomic oxygen is split into individual atoms and then recombined in the triplet state to form ozone. The cold plasma machine uses pure oxygen as the input source to produce a maximum concentration of about 5% ozone. They produce more ozone in a given time than UV generation. However, since cold plasma ozone generators are very expensive, they are found to be less than the first two types. The discharge appears as a filamentous transfer of electrons (microdischarge) in the gap between the two electrodes. In order to evenly distribute the microdischarge, a dielectric insulator must be used to separate the metal electrodes and prevent arcing. Some cold plasma units also have the ability to produce short-lived oxygen allotropes, including O4, O5, O6, O7, and the like.\n-- End --\n\nSimilar article ranking\n\nOzone Equipment\n\nOzone Application\n\nLatest news articles", "pred_label": "__label__1", "pred_score_pos": 0.5133751630783081} {"content": "Tech —\n\nUnderstanding CPU caching and performance\n\nAn introduction to the concepts of CPU caching and performance.\n\nThe memory hierarchy\n\nI'm sure you've figured it out already, but the warehouse in our analogy is the level 1 (or L1) cache. The L1 can be accessed very quickly by the CPU, so it's a good place to keep the code and data that the CPU is most likely to request, next. (In a moment, we'll talk in more detail about how the L1 can \"predict\" what the CPU will probably want.) The L1's quick access time is a result of the fact that it's made of the fastest and most expensive type of static RAM, or SRAM. Since each SRAM memory cell is made up of four to six transistors (compared to the one-transistor-per-cell configuration of DRAM) its cost-per-bit is quite high. This high cost-per-bit means that we generally can't afford to have a very large L1 cache unless we really want to drive up the total cost of the system.\n\nIn most current CPUs the L1 sits on the same piece of silicon as the rest of the processor. In terms of the warehouse analogy, this is a bit like having the warehouse on the same block as the workshop. This has the advantage of giving the CPU some very fast, very close storage, but the disadvantage is that now the main memory (our suburban warehouse) is just as far away from the L1 cache as it is from the processor. So if some data that the CPU needs isn't in the L1, a situation called a cache miss, it's going to take quite a while to retrieve that data from memory. Furthermore, remember that as the processor gets faster, the main memory gets \"further\" away all the time. So while our warehouse may be on the same block as our workshop, the lumber yard has now moved not just out of town but out of the state. For an ultra-high-clockrate processor like the P4, being forced to wait for data to load from main memory in order to complete an operation is like our workshop having to wait a few days for lumber to ship in from out of state.\n\nCheck out the table below, which shows common latency and size information for the various levels of the memory hierarchy. (These numbers are a bit old. The current numbers are smaller and shrinking all the time). Notice the large gap in access times between the L1 cache and the main memory. For a 1 GHz CPU a 50 ns wait means 50 wasted clock cycles. Ouch. To see the kind of effect such stalls have on a modern, hyperpipelined processor, check out Part I of my P4 vs. G4e comparison.\n\nThe solution to this dilemma is to add more cache. At first you might think we could get more cache by enlarging the L1, but as I said above the cost considerations are a major factor limiting L1 cache size. In terms of our workshop analogy, we could say that rents are much higher in-town than in the suburbs, so we can't afford much warehouse space without the cost of rent eating into our bottom line to the point where the added costs of the warehouse space would outweigh the benefits of increased worker productivity. So we have to fine tune the amount of warehouse space that we rent by weighing all the costs and benefits so that we get the maximum output for the least cost.\n\nA better solution than adding more L1 would be to rent some cheaper, larger warehouse space right outside of town to act as a cache for the L1 cache. Hence processors like the P4 and G4e have a Level 2 (L2) cache that sits between the L1 cache and main memory. The L2 cache usually contains all of the data that's in the L1 plus, some extra. The common way to describe this situation is to say that the L1 cache subsets the L2 cache, because the L1 contains a subset of the data in the L2. In the picture below, the red cells are the code and data for the process that the CPU is currently running. The blue cells are unrelated to the currently active process. (This diagram will become more clear once we talk about locality of reference.)\n\nThis series of caches, starting with the page file on the hard disk (the lumber yard in our analogy) and going all the way up to the registers on the CPU (the workshop's workbenches), is called a cache hierarchy. As we go up the cache hierarchy towards the CPU, the caches get smaller, faster, and more expensive to implement; conversely, as we go down the cache hierarchy they get larger, cheaper, and much slower. The data contained in each level of the hierarchy is usually mirrored in the level below it, so that for a piece of data that's in the L1 cache there are usually copies of that same data in the L2, main memory, and page file. So each level in the hierarchy subsets the level below it. We'll talk later about how all of those copies are kept in sync.\n\nLevel Access\nTechnology Managed\nRegisters 1-3 ns ?1 KB Custom CMOS Compiler\nLevel 1 Cache (on-chip) 2-8 ns 8 KB-128 KB SRAM Hardware\nLevel 2 Cache (off-chip) 5-12 ns 0.5 MB - 8 MB SRAM Hardware\nMain Memory 10-60 ns 64 MB - 1 GB DRAM Operating System\nHard Disk 3,000,000 -\n10,000,000 ns\n20 - 100 GB Magnetic Operating System/User\n\n\nAs you can see from the above table, each level of the hierarchy is controlled by a different part of the system. Data is promoted up the hierarchy or demoted down the hierarchy based on a number of different criteria, but in the remainder of this article we'll only concern ourselves with the top levels of the hierarchy. Also, again note that these numbers are kind of old. I cobbled them together from a chart I found on the web (check the bibliography) and the Hennessy and Patterson book. More detailed numbers for P4 and G4e-based systems will be forthcoming in the next installment.\n\nYou must to comment.\n\nChannel Ars Technica", "pred_label": "__label__1", "pred_score_pos": 0.503132164478302} {"content": "Bas Reus' quest on self-organization and online collaborative spaces\n\nSelf-organization as concept of a system?\n\nPosted in online collaborative spaces, self-organization by Bas Reus on November 12, 2009\n\nThe last post about ‘Systems thinking’ again showed differences in understanding of the subject. Mainly when systems thinking is compared to organizations. Can we make use of systems thinking when looking at organizations? Some think we can. Some think we can’t. That’s no surprise, as it is precarious to directly compare an organization with a system. It is very much a matter of definitions. I’m not after a discussion for definitions or understanding of a concept. My assumption (due to the earlier fruitful discussions) is that an organization is not a system, but at least it can help to apply systems thinking on organizations, as it helps to apply other thinking on organizations. The complexity and uniqueness of organizations just makes it impossible to always apply one way of thinking.\n\nWhat about self-organization? It is not an organization, nor a complex adaptive system, rather, it is a process where organization spontaneously increases. Recently I was pointed to the work of the Japanese professor Iba (thanks Margaret). He’s definitely a systems thinker, especially complex systems and autopoiesis. He explains that there are many differences in theories when people are referring to systems theory. I make the mistake myself, when talking about systems thinking and systems theory. Prof. Iba gives a brief history of systems theory, that developed from 1st generation systems theory to 3rd generation.\n\n\nThe most interesting shift is from the 2nd to the 3rd, from self-organizing systems to autopoietic systems. Iba notes that there is a clear distinction between “self-organization” and “autopoiesis” after the revolution caused by third generation. In this context, self-organization is focused on structural formation, but autopoiesis is focused on system formation. This is where Luhmann comes in. Iba quotes him:\n\nAutopoietic systems, then, are not only self-organizing systems, they not only produce and eventually change their own structures; their self-reference applies to the production of other components as well. This is the decisive conceptual innovation. […] Thus, everything that is used as a unit by the system is produced as a unit by the system itself. This applies to elements, processes, boundaries, and other structures and, last but not least, to the unity of the system itself.\n\nInteresting to notice is that in the thinking of Iba (and Luhmann), self-organization and autopoiesis are concepts of a system. I thought that Luhmann couldn’t help me very much, but now I have my second thoughts on that. By applying his thinking, I conclude what is important is that organization is defined by the interplay between the elements of the system (or organization). The elements (or people) itself are not important for the system (or organization) to work, but the events and as a result the change in the elements and the system (again, or organization) due to the events are what matters.\n\nUnfortunately, I have to compare systems and organizations once more. However, I keep struggling with it, it is not very satisfying. But if we are to understand social behavior in relation to an organization a bit more, I think self-organization or even autopoiesis can be of help. That brings back systems thinking or systems theory, at least for now, because I’m not in the process of developing a new theory here.\n\nTo conclude this post, self-organization (or autopoiesis) can apparently be seen as a concept of a system. The constant processes that come into play during self-organization makes organizations (or systems) change constantly. That is, the processes, the actors, and the whole (the organization or system). That makes an organization an almost fluid ‘thing’, like a Barbapapa. Food for thought. If that is true, how can we have an online collaborative space that functions like a fluid, as it acts as an environment (or system)?", "pred_label": "__label__1", "pred_score_pos": 0.9935610890388489} {"content": "Dry Needling: More Than Just a Fad?\n\nMarch 28, 2018\n\nIt appears Dry Needling is officially here to stay. It has been a bit of a tumultuous few decades for this new modality, filled with controversy, intrigue, and misconception. Controversy regarding its safety and legality, with equal parts intrigue and misconception regarding its background and efficacy.\n\nIf you haven’t heard of it, you will. Since its explosion on to the mainstream about a decade ago, it has seen substantial increases in popularity and research. Go ahead, type in “dry needling” into Google, I’ll wait…. As you can see, the internet has exploded with courses, advertisements, testimonials, litigation, and information. With the new age of information access, it can be really difficult to sift through it all.\n\n\nSo, Does it work? Who can do it? Is it safe? What it is really doing? Have no fear….. We’re here to help!\n\n\nWhat Is It?\n\nLet’s first start by tackling what it’s NOT. Although dry needling is the use of small, filiform needles with the intention of improving neuro-musculoskeletal problems, it is certainly NOT acupuncture. No doubt they look similar; they use the same tool! But that’s just a small portion of it. Dry Needling does not identify with its Eastern Medicine cousin’s ideas on yin/yang, lines of flow, or energy meridians. It focuses much more on tangible, neuro-musculoskeletal problems, such as trigger points, flexibility, muscle recruitment, and pain reduction. Acupuncture, having been around for much longer (centuries), is a popular modality for a variety of conditions, including things like the common cold or depression, and is only within the scope of practice of a licensed acupuncturist.\n\n\nQuite simply: the tool does not define the profession. Holding a hammer certainly does not make me a carpenter just the same that a calculator does not make me an accountant! Long story short: We’re different, but both effective! It is important to keep that in mind.\n\n\nBook Definition: “Dry needling is a skilled intervention that uses a thin filiform needle to penetrate the skin and stimulate underlying myofascial trigger points, muscular, and connective tissues for the management of neuromusculoskeletal pain and movement impairments. [It] is a technique used to treat dysfunctions in skeletal muscle, fascia, and connective tissue, and to diminish persistent peripheral nociceptive input, and reduce or restore impairments in body structure and function, leading to improved activity and participation.”1\n\n\n\n\nPart of Your Plan of Care!\n\nAfter an evaluation from a licensed professional, he or she may determine you would be a good candidate for dry needling. In many cases, it allows health professionals to get to places that would otherwise be difficult to reach. Deeper tissues, like the deep gluteal muscles or back stabilizers, pose a real problem due to the amount of pressure and contact force it takes to get to them. This can bring about a very uncomfortable experience… think about that aggressive sports massage you got when you were already sore…. ouch!\n\n\nDry Needling can be a bit more specific and targeted to tissue that is dysfunctional. However, it is ALWAYS part of a broader, more comprehensive approach. Dry Needling can be exceptionally supportive for managing pain or dysfunction, but it should always be incorporated with follow up and reinforcing behaviors or exercise. 2,3  \n\n\nWhat Does it Do and How Does it Work?\n\nWithout completely boring you to death with fancy, and confusing, 5 syllable words with over-the-top medical connotations, I am going to give you the cliff note version of how it all works. Essentially, it comes down to 3 concepts:\n\n\n1. Trigger Points and Myofascia\n\n2. The Nervous System\n\n3. The Brain\n\n\nUltimately, all work together, but you might hear various treatment impacts depending on the training and beliefs of the health care practitioner you see. Inserting the needle into areas of pain, limitation, or dysfunction has been shown to change the chemical environment of the tissue (helping normalize things!) This might include increases in tissue blood flow, which might help with a healing response.\n\n\nIt also affects the nervous system and the brain! In the same manner that we rub our elbow when we bump it on the coffee table, the needle provides a stimulus to the brain which can override or occupy it from the current state of pain it is perceiving.\n\n\nLastly, it can improve nutrition to the nervous system. Your nerves are a pipeline to and from the brain bringing information and also nutrition. There is some evidence to support that needles close to nerves or in muscles close to nerves, can improve the quality of that transportation. This could be pain reduction, improved strength or muscle quality, or relaxation. Something like a reset provided to a locked-up computer!\n\n\nThe research out there says it works, although the research depth isn’t quite enough to say so completely. As with many medical tools, theorems, and practice patterns, more research is needed to study the variables at work! The land of research has not quite caught up yet to give use exact specifications about all the variables being impacted by the needle!2-4\n\n\nHow about an example? It is marathon season after all, and that usually means no shortage of runners with foot or ankle pain due to the mileage and beating imposed on their lower bodies. Dry Needling is very helpful in managing things like shin splints, ankle sprains, tendonitis, etc. Each of these would be evaluated first, but certainly would fall within the umbrella of management options.\n\n\n\nAlthough dry needling is certainly an invasive procedure, it is typically done in the clinic. It is strongly encouraged your health care professional practice clean environment techniques, and always practice sterile needle technique.\n\n\nIs This Done in the Clinic?\n\nYes! Although dry needling is certainly an invasive procedure, it is typically done in the clinic. It is strongly encouraged your health care professional practice clean environment techniques, and always practice sterile needle technique. Essentially, be diligent you observe them use brand new, unopened needles and dispose of them into a sharps container. Proper hand sanitation and clean work space should also be a must! Practitioners with proper training and education will adhere to these rules without question! Be diligent and ask plenty of questions. Any health care professional should have training and experience with dry needling outside of basic school education.\n\n\nWhat Risks Should I be Concerned About?\n\nDry Needling is actually very low risk when performed by a person with training and in compliance with appropriate safety concerns. The most common reactions include bruising, soreness, or a small hematoma. Chances of infection are substantially small (assuming the use of clean environment and sterile needle); and the risk of serious events (things like organ damage) are very very low when dry needling is done by an educated and experienced clinician.5,6 Expect to feel sore, like workout sore, but that usually goes away in a few hours. In the meantime, keep moving! Light aerobic exercise, like riding a bike, is helpful for the soreness afterwards.\n\n\nTake Home\n\nThe primary goal of Dry Needling is to desensitize supersensitive structures, to restore motion and function and to possibly induce a healing response to the tissue. For seasoned practitioners, Dry Needling is extremely beneficial for quick and tangible results on top of other movement remediation. I realize the above it not dense with research, references, and huge data. The truth is, its lacking and this write up is to ultimately give you some insight into what is out there. I would very much encourage speaking to a practicing dry needler or seek out more information!\n\n\nAbout the Author: Chris Juneau PT, DPT, SCS, CSCS, USAW-2\n\nChris is a Sports Specialist and Sport Performance Trained, Physical Therapist with Memorial Hermann Ironman Sports Medicine in Houston, Texas. Chris completed his sports training and education with The University of St. Augustine, The Ohio State University, and University of Louisville.\n\nHis background and training are rooted in sports medicine and performance, hip and knee preservation management, and on-field sports care. He has spent time working with multiple orthopedic physicians and surgeons to develop post-operative protocols and procedures, and now works very closely with Dr. Alfred Mansour and the Hip Preservation Program within the University of Texas and Memorial Hermann Healthcare systems. He is currently an employee of the Ironman Sports medicine clinic with the Memorial Hermann and is involved in sports residency and internal administrative function.  He also helps as an on-field responder, coaches Olympic lifting, and provides consultation and educational resources to local school sports and other agencies.\n\n\n\nFor further questions, comments or scheduling feel free to email me at christopher.juneau@memorialhermann.org or contact our clinic at 713-526-6143\n\n\nReferences or More Information?\n\nThe “Dry Needling in Physical Therapy” page at  ww.apta.org/StateIssues/DryNeedling features resource papers describing what the intervention is, how it is used by PTs, APTA positions, evidence, and more. The site features state resources, as well, including attorneys general opinions.\n\n1. APTA document Description of Dry Needling in Clinical Practice: An Educational Resource Paper. www.apta.org/StateIssues/DryNeedling/\n\n2. American Physical Therapy Association. Description of Dry Needling in Clinical Practice. http://www.apta.org/StateIssues/DryNeedling/. Published February 2013. Accessed February 9, 2015.\n\n3. Dunning, J, Butts R, Mourad F, et al. Dry needling: a literature review with implications for clinical practice guidelines. Phys Ther Rev. 2014. 19(4): 252–265.\n\n4. Mejuto-Vasquez MJ, Salom-Moreno J, Ortega-Santiago R, et al. Short-term changes in neck pain, widespread pressure pain sensitivity, and cervical range of motion after the application of trigger point dry needling in patients with acute mechanical neck pain: a randomized clinical trial. J Orthop Sports Phys Ther. 2014:44(4):252-260.\n\n5. Brady S, McEvoy J, Dommerholt J. Adverse events following trigger point dry needling: a prospective survey of chartered physiotherapists. J Man Manip Ther. 2014; 22(3): 134–140.\n\n6. Cummings T, White A. Arch Phys Med Rehabil. Needling therapies in the management of myofascial trigger point pain: a systematic review.  2001;82(7):986-92", "pred_label": "__label__1", "pred_score_pos": 0.8822029829025269} {"content": "Why Should You Conduct Employee Satisfaction Surveys?\n\nEmployee Engagement\nNovember 27, 2020\nTaruna Lohmror\n\n\n\nTo avoid high turnover rates, you want to look at the various ways to keep your employees happy, right? Ensuring your employees are happy is also good for you and the company, seeing happier employees work harder. Studies show that they are up to 12% more productive!\n\nThis is exactly why you should conduct regular employee satisfaction surveys. So, let’s dive a little deeper and explore how this can benefit your company.\n\nWhat Is An Employee Satisfaction Survey?\n\nEmployee Satisfaction Survey\n\n\nThe main purpose of the employee satisfaction survey is to allow management better insight into how they can improve systems and processes that are in place. It also allows management to see exactly where they need to improve by identifying common areas in which employees feel unsatisfied or frustrated.\n\nWith the results gathered from the survey, ideally, the point is to promote a positive and inclusive work culture. With surveys, companies can listen to employees' needs and work toward creating an environment where employees feel valued and included.\n\n\nWhy Do Companies Need To Conduct An Employee Engagement Satisfaction Survey?\n\nImportance of Employee Satisfaction Survey\n\n1. It Boosts Employee Engagement\n\nIt Boosts Employee Engagement\n\n\nEmployees that are engaged will go the extra mile to reach their role targets. So, you want to make sure that they are engaged.\n\n\n\n\n2. Allows For Better Understanding\n\nAllows For Better Understanding\n\nHave you given thought to how employees are feeling? What are their attitudes (both positive and negative)? How do they feel about any changes that have taken place? Do they agree or disagree with them?\n\n\n3. Insights Into The Growth Of Organizations\n\nInsights Into The Growth Of Organizations\n\n\n\n\n\n4. Allows Employees To Be Heard\n\nAllows Employees To Be Heard\n\n\nThe survey allows employees to have a platform where they can express their views freely in a safe space. Anonymous surveys are an excellent way to get deeper and more honest insights. This is because your employees know that they won’t face any repercussions for giving their opinions.\n\n\n5. Predicts And Reduces Employee Turnover\n\nPredicts And Reduces Employee Turnover\n\nHigh employee turnover rates are a concern for companies because it has its own repercussions regarding time and money invested in employees.\n\nSurveys provide valuable insights into how to limit the number of employees that think of leaving. Asking the right questions enables you to get a clear picture of how happy your employees are at their jobs. It can also highlight what employees want and need in terms of their careers in the long run.\n\nFactors That Contribute To Employee Satisfaction\n\nemployee satisfaction factors\n\nLet us go through some employee satisfaction factors:\n\n1. Financial Stability And Salary\n\nFor employees, it could be that everything related to job satisfaction comes second to knowing that the company they work for isn’t going to go out of business soon. Financial security takes a lot of stress off one’s shoulders. So, it makes sense that this is a top contributor to employee satisfaction.  \n\n\nCheck this out to understand the \"Importance of Employee Satisfaction Surveys.\"\n\n2. Appreciation\n\n\nNot all employees will always feel confident or free enough to speak openly about feeling undervalued. There could be times when they’ve thought that their hard work has gone unnoticed. A simple ‘thank you’ goes a long way in ensuring that your employees feel valued and appreciated.\n\n3. Good Relationships With Colleagues And Management\n\nOften, poor relationships with co-workers or managers can make facing the workday just a little tougher. A lot of the time, the unpleasantness experienced could be resolved through effective communication. Perhaps even some team-building activities or a weekly team lunch would help?\n\nHaving good working relationships contributes to employee satisfaction in many ways. It makes them feel better about going into work, boosts productivity and morale, and contributes to a more positive work environment.\n\n4. Work-Life Balance\n\n\nThey want to spend time with their families and friends and have time for their hobbies and other things they love. This is especially true when it comes to millennials. More than 80% say that a key consideration for a new job is how it will affect their work-life balance.\n\n5. Career Development\n\n\nEmployees want to know that the company they’re working for has a keen interest in advancing their careers. Do companies afford them opportunities to learn new skills or build on those they are good at and passionate about?\n\n\nSample Employee Satisfaction Survey Questions To Include\n\nSample Employee Satisfaction Survey Questions To Include\n\nInclude these 16 Questions to measure Employee Satisfaction level in your Organization.\n\n 1. What are your thoughts on the company’s culture?\n 4. How open are managers to feedback?\n 6. Is important company news communicated regularly and clearly?\n 8. Is there visible transparency from management?\n 9. Is the workload distributed evenly?\n 10. How meaningful do you think your work is?\n 11. Is there enough attention given to career development?\n 12. Are you adequately equipped to do your job?\n 13. Are job roles and responsibilities clearly defined?\n\nRead these \"20 Employee Engagement Survey Questions\" that will make the survey more interesting.\n\nFinal Thoughts\n\nWhen thinking about the costs of training new employees and dealing with high turnover rates compared with the benefits of employee satisfaction surveys, the decision is a no-brainer. Once you’ve seen the results, you’ll soon discover that employee satisfaction surveys are well worth the time and effort.  \n\nMake conducting your regular surveys easier with Empuls by Xoxoday. You can create your own surveys or choose from our templates to make sure that you’re asking the right questions.\n\nEmpuls makes it easy for you to see the results of your surveys and put them into perspective so that you can see how your employee satisfaction improves over time. By doing so, you will start to see how the simplest changes can result in much happier employees!\n\nGuide To Action For Empuls Engagement Survey: Employee Recognition And Career Growth\nOriginally published on\nNovember 27, 2020\nUpdated on\nDecember 28, 2020\nBook a demo\n\nFeatured Articles\n\nCopyright @ Xoxoday 2020\nAll rights reserved.", "pred_label": "__label__1", "pred_score_pos": 0.7186176776885986} {"content": "Free adult chat maryland line maryland line Looking Private Butt\n\n\n\nThe New York City English features shared with this dialect include: Yat also lacks the typical vowel changes of the Southern Shift and the pin—pen merger that are commonly heard elsewhere throughout the South. One historical English dialect spoken only by those raised in the Greater New Orleans area is non-rhotic and noticeably shares more pronunciation commonalities due to very strong historical ties with the New York accent than with other Southern accents. African-American English has many common points with Southern American English dialects due to the strong historical ties of African Americans to the South.\n\nSince at least the s, this local New Orleans dialect has popularly been called \"Yat\", from the common local greeting \"Where you at? The Southern United States underwent several major sound changes from the beginning to the middle of the twentieth century, during which a more unified, region-wide sound system developed, markedly different from lne sound systems of the nineteenth-century Southern dialects.\n\nUnfortunately, our website is currently unavailable in most European countries.\n\nThis French dialect is spoken by many of the older members of the Cajun ethnic group and is said to be dying out. We are engaged on the issue and committed to looking at options that support our full range of digital offerings to the EU market.\n\nFree adult chat maryland line maryland line\n\nModern-day Charleston speakers have leveled in the direction of a more generalized Midland accent, away from the city's now-defunct, traditional Charleston accent, whose features were \"diametrically opposed to the Southern Shift We continue to identify technical compliance solutions that will provide all readers with our award-winning journalism.\n\nThis dialect adjlt out of fashion after Marylwnd War II, but experienced a renewal in primarily male speakers born since the s, who have been the most appealed by, and the biggest appealers for, a successful Cajun cultural renaissance. The South proper as a present-day dialect region generally includes all of these pronunciation features below, which are popularly recognized in the United States as a \"Southern accent\".\n\nHair ColorThick\nBust size30\nSeekingSeeking Sexual Meeting\nEye ColorHazel", "pred_label": "__label__1", "pred_score_pos": 0.9571996331214905} {"content": "Science is pro-life.  It’s our job to provide the most up-to-date science so our community leaders can make pro-life decisions. We spend thousands of hours every year carefully reading studies, government documents, scientific journals, and talking to experts around the country to ensure that we have the most detailed and credible information. This information is then used in our education materials, in drafting of legislation, and in advising community leaders.\n\nYou can have easy access to a majority of our research and information via our website, If you would like further information on a topic, or location specific information and resources, email us at or call 312.422.9300.", "pred_label": "__label__1", "pred_score_pos": 0.9960774183273315} {"content": "At What Age Does Vision Start To Decline?\n\nIs 5 eyesight bad?\n\n\nThese are rare, though, so no cause for alarm.\n\n\nHow can I improve my eyesight after 40?\n\nFortunately, people with presbyopia now have many options to improve their vision….Encountering problems with near vision after 40Eyeglasses, including reading glasses, bifocals, and progressive lenses.Contact lenses, including monovision and multifocal lenses.Laser surgery and other refractive surgery procedures.\n\nIs minus 2.75 eyesight bad?\n\n\nDoes eyesight get worse as you age?\n\nAs you age, your eyes will begin to change and your vision can get worse. This is completely normal. There are steps you can take to keep your eyes healthy and maintain your eyesight for as long as possible. Be sure to talk to your optometrist about how to take care of your eyes and receive regular eye exams.\n\nDoes eye power increase after 18?\n\nYes, usually the eye power can increase. But it’s not that simple. Myopia or minus eye power can increase with age. Hyperopia or plus eye power does not increase and in fact, can reduce a bit up to 6-7 years of age.\n\nHow can I improve my eyesight in 7 days?\n\n\nCan eyesight improve?\n\n\nDoes your vision change as you get older?\n\n\nWhat food improves your vision?\n\n\nIs minus 1 eyesight bad?\n\n\nIs eyesight good or bad?\n\nIn this case, since your eyesight is affecting your life negatively, it’s more understandable to think of it as “bad.” In reference to the -1 example, -1 is not considered a particularly strong prescription. If your eyesight is -1, you’re probably still able to perform certain daily tasks without your glasses.", "pred_label": "__label__1", "pred_score_pos": 0.6784518957138062} {"content": "Information about Texas and Areacodes (512-782)\n\n\nHouston, TX is located in the Middle of the Country of Texas. It is an area that's been created to accommodate the large influx of immigrants, and its own geography lends itself well to long distance travel by car or plane. Popular among tourists are the Houston, Texas All Star basketball team who perform in the Astrodome. Because of this, Houston, Texas is regarded as a tourist destination throughout the USA.\n\nIf you haven't seen the United States you'll discover that Texas is full of things to do. In your way to visit a different region of the nation, the fantastic thing about the united states is that the vast range of historical, natural and cultural attractions. For travelers from the united states is the number of different types of attractions Among the greatest draws. This means that if you go for a vacation or business trip, you can expect an assortment of different types of entertainment available at any 1 time.\n\nThe amount of museums is far greater than anywhere else in the world, when you go to the United States. The Smithsonian is one of the most well-known museums in the United States, and it is full of art collections that are amazing. You may even go for a bird watching excursion where birds can be seen by you in all sorts of environments. A plane ride could be well worth it if you want to go on a holiday excursion. The museums in Texas are certain to keep you busy as long as you plan on staying in the city of Houston, TX. The Texas town is a great place to visit.\n\nCaller Information for 512-782-#### Phone Numbers\n\nThe +1 512 782 #### place code numbers are situated in Austin, Texas. This serviced is offered by Southwestern Bell for Landline telephone numbers. Retrieve caller information such as 512782####, we offer a whole reverse phone number report for (512) 782 #### numbers in Texas. Reverse Phone Number detailed information for 1-512-782-#### telephone numbers!", "pred_label": "__label__1", "pred_score_pos": 0.6821922063827515} {"content": "Psychotechnologies of Influence\n\n\n\n\n\n\n\n\n\n\nChanging habitual behaviors\n\nEveryone has habits – some good, some bad, some inconsequential. One study suggests  that something like 43% of our behavior is habitual. This includes sequences of behavior that we’ve “chunked” together, and often perform automatically, so we don’t have to make myriad decisions every day. When you get in your car to drive to your friend’s house, you’re probably thinking about your destination or what you want to say to your friend. You don’t have to decide on each action as you automatically depress the clutch, turn on the ignition, fasten your seat belt, release the parking brake, shift into first gear or reverse, and  step on the gas pedal while easing off on the clutch. You don’t always have to be mindful about driving until you’re in traffic. We spend part of each day on “automatic pilot,” not having to make individual decisions about routine behavior sequences – which can include such things as drug abuse or “screen addiction.”\n\nThroughout most of history, an individual’s habits arose from the culture and that individual’s circumstances and proclivities. These days, many of our habitual behaviors have been conditioned by corporate social engineers, applying principles of social science in the fields of advertising, marketing, public relations, and political consultancy. Using classical (Pavlovian) conditioning and other psychotechnologies of influence, they “invisibly” shape habitual behavior on a mass scale. I’m convinced that America’s obesity epidemic is largely due to the constant barrage of advertisements for tasty, if not necessarily healthy, foods. I’ve written about this corporate social engineering in my book, Ad Nauseam: How Advertising and Public Relations Changed Everything.\n\nEverybody knows how hard it can be to change a bad habit. During my career, I had many clients who entered therapy because they needed professional help in order to change a bad habit. Willpower by itself is seldom sufficient to establish a desired change, because you have to maintain mindful awareness of your triggers and urges/cravings every waking hour, and to persistently resist temptation. The rewards of (for instance) dieting are long-term; the reward of giving in to a food craving is immediate. The good news is that once you’ve successfully changed a habit, it gets easier and easier to  maintain the change as time goes on. Quitting smoking, my nicotine cravings used to last all day. Eventually they only lasted for seconds, and now I haven’t had one for years.\n\nWhether smart phone use can be addictive depends on your definition of addiction. I’m “old school” on the subject and believe that tolerance (needing more over time to meet your need) and physiological withdrawal are hallmarks of true addiction. Sex and gambling and screen time don’t qualify as addictions by the classic definition, but the physiological responses of gambling/sex/smartphone/gaming “addicts” are very similar to the responses of drug addicts. There may be withdrawal, in the form of cravings, but they’re psychological in origin.\n\nChanging a habit often requires  a strategic approach to the problem. What mental, emotional, and social factors tend to keep the undesirable behavior in place? Once you’ve analyzed the factors that support your bad habit, make a plan. Visualize how your life will be better when you’ve succeeded.\n\nHere are four things you can do to replace a bad habit with a good one. (1) Your plan should take into account the things related to the bad habit, such as time, place, emotional states, and social factors ( i.e. It’s not a good idea to hang around with your drinking buddies early in sobriety). (2) Declare your intention and your criteria for success to friends and family. This gives you an added social incentive to succeed. (3) Build-in  consequences, positive or negative. They can be natural consequences, or constructed. A natural, positive consequence if you’re quitting smoking is to add up the money you’re saving, and when you accumulate enough, treat yourself to a trip to Disneyland, or Vegas, or wherever. A negative, constructed consequence might be writing a $100 check to some organization that you despise, and giving it to a friend, to be mailed if you fail to change the targeted habit. (4) Don’t rely on good intentions and willpower, but structure your environment to make the bad habit more inconvenient. You can’t binge on cookies and ice cream while watching TV if you don’t buy them and bring them home in the first place. Other environmental factors are social – enlisting the support of those around you to help you meet your goal, and avoiding those who might undermine your resolve.\n\nI’d never say “Good luck” to someone who announced his or her intent to kick a bad habit. Luck has nothing to do with it, and willpower is only one of the things you’ll need to succeed.\n\nThe invisible profession\n\n\n\n\n\n\n\n\n\n\n\n\n\nPsychological learning theory\n\nI briefly covered behavior modification in a prior post. In this post I’ll explain classical and operant conditioning in more detail, with examples to illustrate the concepts. The principles of behaviorism, or learning theory, are fundamental to the science of psychology. Two of the names most commonly associated with behavioral psychology are J. B. Watson and B.F. Skinner. Two key words in learning theory are stimulus and response.\n\nClassical conditioning is also known as Pavlovian conditioning, based on Ivan Pavlov’s famous experiments with drooling dogs. Salivation is what behaviorists call an unconditioned response to an unconditioned stimulus – the presentation of food. In other words, neither dogs nor humans have to be taught to salivate when we see and smell food that appeals to us. A bell is initially a neutral stimulus, having nothing to do with food or salivation. But when a bell is rung every time food is presented, it becomes a conditioning stimulus, as the brain learns to associate it with mealtime. Eventually the ringing of the bell alone, without the presentation of food, will stimulate salivation – a conditioned response.\n\nClassical conditioning is one of the most powerful tools used by marketers and advertisers to condition behavior on a mass scale, through the popular media. They systematically condition consumers to associate pleasant or desirable things with symbols such as McDonalds’ golden arches, logos, slogans, jingles, and attractive people giving sales pitches. They use it because it works. You see bikini-clad babes posing at car and boat shows because it increases the sales of the cars and boats  they’re posing in front of.\n\nWhere classical conditioning is a passive mode of learning, involving the creation of unconscious associations, operant conditioning involves systematic responses that shape a target behavior, making it occur either more frequently or less frequently. The process starts with recording the baseline frequency of the target behavior, i.e. how frequently it naturally occurs without systematic reinforcements being applied. Things that happen consistently as a consequence of the target behavior will tend to make it occur more frequently, if followed by a rewarding – or positively reinforcing – response (e.g. praise, money, candy, affection, etc.). If an expected reward is withheld – negative reinforcement – or the behavior is somehow punished – aversive reinforcement – the behavior tends to occur less frequently. Negative reinforcement is also used to increase the frequency of the behavior, when an aversive consequence (e.g. pain, shaming) is removed/avoided.\n\nWe might go to work even if we don’t really want to, because we know that our behavior will be reinforced by a paycheck. We know that if we stop going to work, the reinforcer will be withheld. Operant conditioning is the way we shape the behavior of our children, and train animals to obey our commands or to learn tricks. It explains the motivation athletes have to spend long hours exercising and practicing their skills.\n\nThe other principle to understand about operant conditioning is ratios of reinforcement, which can determine how lasting a conditioned behavior is. A hungry, caged rat can be taught to press a lever relatively quickly, if it’s rewarded with a food pellet every time the lever is pressed – a 1:1 ratio of reinforcement. But if you stop reinforcing the learned behavior with food, it won’t persist. In order to make the new behavior more persistent, you gradually “thin out” the frequency of reinforcement, perhaps starting with a 1:2 ratio. Now the rat only gets food every second time it presses the lever. Then you can go to other fixed ratios (1:3, 1:4); but if the ratio becomes too thin or if the food pellets stop coming, the learned behavior ceases, or in behavioral terms is extinguished.\n\nIf you really want a target behavior to persist without reinforcing it at a fixed interval, you move to a variable ratio: you vary the ratio, so the rat doesn’t know how many times it will have to press the lever (1:2, then 1:5, then 1:3, then 1:6, then 1:2, etc.) in order to get the food pellet. A hungry rat will keep pressing the bar, having learned that it will eventually get rewarded with a pellet. A well-fed rat will find better things to do with its time.\n\nTo take this to the level of human conditioning, think of the difference between a vending machine (with a 1:1 ratio of reinforcement) and a slot machine (with a variable rate of reinforcement). Every time you feed the required amount of money into a soda machine and press a button, you expect to get a soda. If you don’t and you’re very thirsty, you might try a second time. But if your behavior isn’t reinforced the second time, you certainly won’t keep feeding money to the machine.\n\nBut if you’re sitting at a slot machine, you don’t expect to be reinforced every time you put in a quarter and pull the lever. You might  get a sequence like this: nothing, $2, nothing, nothing, $5, nothing, nothing, nothing, $3, nothing, nothing, etc.. The behavior of feeding money to the machine and pulling the lever might persist until you’re out of money. Gambling machines have been called “addictive” because when we get money back from the machine, we get a jolt of the neurotransmitter serotonin ( a positive reinforcer) and persist, anticipating the next jolt – much like a hungry rat conditioned to persist in pressing a lever, knowing it will eventually get a food pellet.\n\nMental pollution, Part 2\n\n\n\n\n\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.8739476203918457} {"content": "A key subsystem of the project on which I work, the Advanced Tomahawk\nControl System (ATWCS), was recently rewritten. In its new incarnation it\nheavily exploits Ada tasking. This, by the way, is still written in Ada\n\nEach of the key entities in this subsystem has two tasks associated with\none to manage access/update and the other to move it down its timeline.\nSince there can be 128 of these entities that means 256 tasks, and with a\n\nof the tasks are dormant at any given time, resulting in very low CPU\nutilization. In addition, since each pair of tasks has no interaction\nof the problem domain closely matches tasking semantics and capabilities.\n\nRecently at an internal design review, a concern was raised about the\n\"excessive tasking\" being \"moreso than is commonly found\".\n\nWhat I'm looking for is experience (anecdotal is fine) wherein at least 250\ntasks are simultaneously active within a single process. I'm focusing more\non the _tasking_ aspects than on the potential complexity of the system in\nwhich they're used--as I noted, this part of the system is not terribly\ncomplex, it just uses a lot of tasks.\n\nThanks for any assistance.\n\nMarc A. Criley\nChief Software Architect\nLockheed Martin ATWCS\n[log in to unmask]\nPhone: (610) 354-7861\nFax : (610) 354-7308", "pred_label": "__label__1", "pred_score_pos": 0.8735046982765198} {"content": "Mobdro FAQ\n\nMobdro is among the best free entertainment apps in the world. Anyone who is looking for a great source of entertainment should consider downloading and using the app today. It’s compatible with Android, PC, Smart TV, and more. In this post, we’ve compiled a Mobdro FAQ to help you navigate the app, learn more about it, and handle any problems you may have with it.\n\nWhat is Mobdro?\n\nTo keep things simple, Mobdro is a free app you can download to watch TV shows, movies, live streams, sports, and more through your device.\n\nHow do I download Mobdro?\n\nDownloading and using Mobdro is slightly more complicated than other apps. The app isn’t available directly through the Google Play Store. It can eb downloaded from a number of third-party websites but we recommend getting it directly from the official website.\n\nIs Mobdro free?\n\nMobdro is completely free to use. The free version has adverts which are used to support the app. There’s also a premium version which has more features and no ads, but the free version offers more than enough.\n\nIs Mobdro safe?\n\nMobdro is completely safe and secure. The app was developed by professionals and will not cause technical issues or damage your device in any way. It also doesn’t download any malicious viruses or other files and will pass any inspection by an antivirus app.\n\nIs Mobdro illegal?\n\nIs Mobdro illegal? The answer is “no”. Mobdro is an open application that is operated under the policy of Luminati SDK EULA. Therefore, you can feel secure when using Mobdro.\n\nHow can I get rid of stuttering and slow streaming?\n\nLike any kind of online application, Mobdro requires an internet connection to work properly. If you have problems with streaming and stuttering, you should check your internet connection. Reset your router and try again. If the problem persists then it could be that your internet speed isn’t fast enough to support the app.\n\nWhat does the “Parse Error” message mean?\n\nA parse error happens when the android version on the device is lower than the version Mobdro was designed for. Mobdro is compatible with Android 4.1 or higher and so a parse error appears if your device is running an older version of Android OS.\n\nIs Mobdro compatible with Google Chromecast?\n\nMobdro is compatible with Chromecast devices that have been properly configured. Mobdro is able to automatically detect Chromecast devices. Mobdro will display an icon to the top of the navigation bar indicating a Chromecast has been found. Tap the icon to stream to Chromecast and move over to the big screen.\n\nA stream that was available yesterday has disappeared. What happened?\n\nMobdro is only able to find and index streams. It doesn’t host any streams of its own and it doesn’t control what happens to the streams. If a stream you want to watch has disappeared, then it means that the stream is offline now. Whether it comes back online or not depends on the streamer.\n\n\nWe hope that this post has cleared up some of the frequently asked questions about Mobdro. Feel free to let us know if you have any additional problems not covered here and we’d be more than happy to help.\nEmail support: [email protected]", "pred_label": "__label__1", "pred_score_pos": 0.9868184924125671} {"content": "Netflix's 2020 Product Strategy\n\nNetflix is the largest streaming service in the world with over 193 million subscribers (as of July 2020) and counting. But what’s their secret when it comes to product strategy?\n\nI’m going to share a few models to help you define your product strategy. Each of these models will be brought to life with a mock 2020 articulation of Netflix's current product strategy.\n\nYou’ll also discover how product strategy helps day-to-day decision-making with two modern-day \"What would you do?\" Netflix cases. So, watch the video or read on to uncover Netflix’s 2020 product strategy and find out what you can learn and even implement in your product strategy going forward.\n\nWhy Product Strategy?\n\nBefore we begin to explore Netflix’s product strategy, it’s important to understand why product strategy is so important and necessary. There are several reasons why strategy is a key part of product-led growth.\n\nFirstly, strategy helps us to communicate an inspired vision of the future. It’s one thing to have an idea in your head but you need the right strategies in place to help communicate that vision to others.\n\nSecondly, combining innovation and invention is no easy task. Inventing new solutions and features can be chaotic and it’s almost impossible to be innovative without any chaos. However, things cannot happen at random. There must be discipline and I believe that strategy is effective at blending these two forces.\n\nProduct strategy is about forming hypotheses to DHM. In other words, you need it to delight customers and do so in a margin-enhancing way. Finally, you need a product strategy to help facilitate prioritization. As product leaders, we can do anything, but we can’t do everything. We must prioritize some things over others and having a strategy in place can help you to do that while also communicating a plan.\n\nProduct Strategy Frameworks\n\nHere are three models (or frameworks) to define your product strategy:\n\nEach of these models has three purposes:\n\n1. Encourage people to think long-term\n\n2. Build cross-functional alignment\n\n3. Help people to form hypotheses to compete long-term\n\nIf you’re a product leader, your main job is to “delight customers in hard-to-copy margin-enhancing ways.”\n\nSo, how do Netflix’s product leaders achieve this?\n\nNetflix offers customers a very convenient service with a wide selection of movies and TV shows they can stream instantly ‘anytime, anywhere.’ Customers can navigate Netflix’s selection very easily and they get a lot of value for their money. Plus, Netflix offers customers a range of high-quality and entertaining original content.\n\n\nA key part of Netflix’s product strategy is to increase profits. I refer to this as ‘margin-enhancing’ and Netflix effectively increases profits in a variety of ways.\n\nI want to take a closer look at the last point in the slide above – “right-size” original content investment. Since Netflix wants to offer a wide range of movies and TV shows to suit all types of tastes and preferences, the company likes to invest in original content. However, they want to pay the right amount for this content. To do this as accurately as possible, Netflix predicts how many people will watch a certain TV show or movie and then line up the cost of investment with their prediction.\n\nFor example, Netflix predicted that 100 million people would watch Stranger Things. Therefore, they were willing to invest $500 million in that series. Bojack Horseman was predicted to gain 20 million viewers, so the ‘right-size’ investment in that show was estimated to be $100 million.\n\nWhat makes Netflix hard to copy?\n\nNetflix isn’t the world’s biggest streaming service for nothing. It is very hard for other companies and streaming services to copy what Netflix does and this makes it very difficult for competitors to compete.\n\nNetflix is a trusted brand. You can trust Netflix to keep your personal details private. Their brand promise is “movie enjoyment made easy” and they achieve this by providing viewers with personalized service and the freedom to watch on almost any device with an internet connection.\n\nHere’s a breakdown of the reasons why Netflix is hard to copy:\n\nNetflix product strategy\n\nNetflix’s product vision began with a simple goal – to get big on DVD. When Netflix started out, they were a DVD rental company and customers had DVD’s delivered to them via postal services. Then, the company’s vision evolved to become leaders in the streaming market. ‘Going digital’ enabled Netflix to expand worldwide. Having achieved all of the above, Netflix is currently placing a strong focus on original content.\n\nThe product team at Netflix prioritize monthly retention as the company’s high-level engagement metric. The team prioritizes other metrics too, including growth and monetization.\n\nThe existing product team focus on key high-level product strategies (see below):\n\nStrategy, Metric and Tactics\n\nHere’s an example of the Netflix 2020 rolling roadmap, which shows how Netflix is implementing each strategy every quarter:\n\n2020 Rolling Roadmap\n\nTwo “What would you do?” Netflix cases\n\nCase 1: Netflix Party\n\nNetflix Party is a Chrome extension app that has become increasingly popular since COVID-19. It allows people to watch the same movie at the same time. They can even chat with each other while watching the movie or TV show. In an isolated time, such as lockdown during the pandemic, many people enjoyed using this Chrome extension to watch movies with friends and family long-distance.\n\nBut is this an idea that Netflix should execute themselves?\n\nIn the past, Netflix has tried a few variations of social experiments including ‘Friends’ in 2009, ‘XBox Party Mode’ in 2010, and ‘Tell a Friend’ in 2018. All three were killed off because not enough people used the features.\n\nHowever, Netflix Party has proven to be quite the success. It grew from 500k to 1M in just 60 days and acquired 10M downloads. This data shows a substantial proof of concept, making it a possible worthwhile investment for Netflix. But the question remains – will this delight in hard-to-copy, margin-enhancing ways?\n\nWell, this extension is hard-to-copy and it would take competitors years to mimic something of this scale. It has the potential to enhance profits via word-of-mouth and increase retention. But, should Netflix invest in this type of extension?\n\nMy opinion is…no, and here’s why:\n\nCase 2: Auto-cancel inactive members\n\nShould Netflix auto-cancel inactive members? One-half percent of Netflix members haven’t used the service in the last 12 months. However, those members are still paying for the service despite rarely using it.\n\nSome might argue that a better alternative would be to send those members an email notification alerting them to the fact they’ve been inactive for so long. The email could say something like “Would you like to cancel?” and that way, the user can decide whether they want to continue paying for the monthly subscription or cancel their membership.\n\nIf members say no, then their service will continue as normal. If they say yes, then their membership is cancelled. However, what happens to the members who don’t respond? Should their membership be auto-cancelled?\n\nIf Netflix were to auto-cancel all of the inactive members, the company would lose $100 million each year. Clearly, introducing the auto-cancel option is not a great way to enhance profits as the company will be losing millions of dollars each year. But what about the ‘delight and hard-to-copy’ side of it?\n\nOffering the auto-cancel feature for inactive users may delight customers since Netflix automatically stops the payments. The user can always re-join if they choose to do so.\n\nMy opinion is that this would be a worthwhile strategy for Netflix to implement and here’s why:\n\nLearnings from Auto-cancel\n\nI hope that you found this post helpful and that it helps you to define your own product strategy in 2020 and beyond.\n\nI think that product teams and product leaders can learn a lot from Netflix’s current product strategy, which can help you make more strategic day-to-day decisions and implement product strategies that will help you reach your vision and goals.\n\nWant to learn more about product strategies and product-led growth? Discover the fundamentals of Product-Led Growth and how you can turn your product into a growth engine by reading the book, The Definitive Guide On Product-Led Growth.\n\nGibson Biddle\nGibson Biddle\nFormer VP Product, Netflix", "pred_label": "__label__1", "pred_score_pos": 0.5414347648620605} {"content": "Workers have legal rights, and you can stand up for yourself at work!\n\nWe have teamed up with our southern sister ROC Asheville to host monthly discussions on Facebook Live, where workers share their experiences organizing their workplaces and expert advocates explain the legal options that workers have and how to effectively fight for them.", "pred_label": "__label__1", "pred_score_pos": 0.5677435398101807} {"content": "Dear Sir or Madam,\nRotopol is an association whose activity is closely related to the field of rotational molding. We conduct research on foundry methods and polymer processing technologies. We always approach our projects with passion, which is why our organization brings together people who want to become involved in the development of rotomolding and support the goals of our activity.\n\n                                                                                                                                       Prof. Marek Szostak\n\nNOTE! This site uses cookies and similar technologies.\n\n\nI understand", "pred_label": "__label__1", "pred_score_pos": 0.9822832345962524} {"content": "The New Authoritarianism & Memory Activism (Upcoming Web Lectures)\n\nRussia’s New Authoritarianism: Putin and the Politics of Order\nWednesday, December 9, 2020\nVirtual Event\n\nWebex Session:\n\nDavid Lewis’s recent book Russia’s New Authoritarianism: Putin and the Politics of Order takes a new conceptual approach to understanding the nature of the Putinist regime in Russia. The book explores how illiberal ideas have shaped Russia’s political debates and influenced both domestic and foreign policy. It highlights the affinity of many aspects of Russian illiberalism with the ideas of the controversial jurist and Nazi supporter Carl Schmitt, particularly the ideas of sovereignty and exceptionality, which are illustrated in the book by case-studies of Russia’s judicial system and the annexation of Crimea. In foreign policy, the book discusses the importance of spheres of influence in Russia’s worldview, and explores the messianic elements involved in Russian policy in Syria. It concludes with a discussion of how Russia’s authoritarian turn fits within a wider global trend towards illiberal politics and authoritarianism.\n\nDavid G. Lewis is Associate Professor of International Relations in the Department of Politics at the University of Exeter. Before joining the University of Exeter, David held academic posts in the Department of Peace Studies, University of Bradford, and worked for the International Crisis Group in Central Asia and in Sri Lanka. He has written extensively on politics and security in Russia, Central Asia and the Caucasus, and on different aspects of international relations and peace and conflict studies. His books include The Temptations of Tyranny in Central Asia (Hurst, 2008) and Russia’s New Authoritarianism: Putin and the Politics of Order (Edinburgh University Press, 2020). His recent research has been on the rise of illiberal ideas and authoritarian practices in global politics, particularly in relation to conflict management and peace-making. He is currently (2019-2021) on part-time secondment as an ESRC-AHRC Research Fellow at the UK Foreign and Commonwealth Office in London.\n\nLast Address memorial plaques in Petersburg\nDear all, you are warmly invited to the next CEES/CRCEES seminar on Wednesday, December 9th, 4:00-5:30pm. All are welcome!\n\nWednesday, December 9th\n\n\nZoom Meeting link:\n\nMeeting ID: 944 1355 9725\n\nPasscode: 073247\n\nDr Galina Oustinova-Stjepanovic \n\nDepartment of Anthropology \n\nUniversity of St. Andrews \n\nThe Name and the Number of the Dead in Memory Activism in Moscow \n\nEvery fortnight, anti-Stalinist activists in Moscow install name plaques on the façades of houses where someone was arrested in the period between 1937 and the early 1950s. On October 29, on the eve of the official day of commemoration of victims of political repressions, thousands of Muscovites participate in the annual name reading ceremony at the Solovetsky stone, a monument to the victims of political repressions, placed outside the Federal Security Services headquarters (previously, NKVD and KGB) on Lubyanka square. Daily, memory activists and volunteers rake through archives and attics in a relentless quest for forgotten names and diaries, and record these names in memory books and catalogues, as well as copy, multiply, digitise and publish them in online archives.\n\nThe impetus for my key argument is an ethnographic observation that the memory activists I met in today’s Moscow give primacy to the singular names of each victim over the final total number of people executed during Stalin’s reign. Such activities reflect a familiar but largely unacknowledged and undertheorized propensity to document, catalogue and speak out the names of victims of atrocities, be it a military conflict or acts of political terror. Arranged as an alphabetical or random sequence, the names are guarded against statistical reason, or the “mania for exact numbers” (Merridale 2000:5) of the official national historiography in Russia. Importantly, the lists of names do not differentiate between a victim and an executioner, between an atheist and a devout priest, or between a Russian and a Jew. This way, the names do not contribute to boundary-policing of sovereignties, national mourning, and aspirations to national unity. Instead, the activists simultaneously assign each name a value of singularity and collect the names into infinitely long registers that establish an undifferentiated, nonnumerical kind of totality: a multitude of the living and the dead. I will argue that the practices of collecting and monumentalizing names of the dead afford an understanding of how the relationship to an unwitnessed historical mass murder and its absent subjects is instituted.\n\nThe CEES Seminar Series is kindly supported by the Macfie Bequest.\n\nThanks to Gabriel Levy and CISR for the heads-up. || TRR\n\nDmitry Markov: Life in the Russian Provinces\n\nThanks to my long-term employment in one organization, I traveled all over Northwest Russia. Going to provincial cities and meeting local social activists was the most inspiring part of the job. When I returned from such business trips, I would tell everyone about the wonderful people I met there and say that they saw everything that was happening around them much more clearly than those who lived in the capitals. In every provincial city, there was always a person who loved their town incredibly, knew everything about it, knew everyone, and did everything they could to make life in that town better.\n\nOr rather, they were trying to keep those towns and villages alive and save what they and the rest of the inhabitants knew and loved from destruction. They wanted to stop the demolition of old houses, the cutting down of forests, and the closing  of schools, hospitals, and clinics, because without all this, their hometowns were doomed to extinction. There was nothing “provincial” about these people, and, most importantly, they were not complacent, unlike, distressingly, so among many activists in the capitals. And what the activists in the provinces said was a hundred times more interesting, original and subtle than what I heard from their colleagues in the capitals, who were always in the limelight and knew how and what to say to make the right impression. It seemed to me that it was the regional activists who, inconspicuously but firmly, were saving my country from complete degradation.\n\nI liked going to Pskov most of all. There, many years ago, I met and then became friends with several wonderful people. I always felt sorry that almost no one I knew at home in Petersburg understood why I admired these trips and these people so much. I had nothing to show them, and I didn’t know how to explain my feelings.\n\nAlthough I had heard about Yuri Dud, I hadn’t watched any of his videos and didn’t want to know anything about him until he made a video about the HIV epidemic in Russia. My friends who help people with HIV said that this film alone has done more to raise awareness than all previous public education campaigns combined. So I watched Dud’s latest film, because I had heard about the Pskov photographer Dmitry Markov. It turns out that Dmitri Markov is even cooler than I had thought, and that I had seriously underestimated Dud.\n\nThe film contains everything that I have seen many times with my own eyes, but could not describe: “simple” people who are amazing in their complexity, people completely ignored by the smart set in the capitals. How is it, for example, that young people who were abandoned as children by alcoholic parents and seemingly have known nothing in their lives but a provincial orphanage and the army actually understand everything that needs to be understood about the world around them much better than many of their peers who grew up in well-off families in Petersburg and Moscow?\n\nValentina Koganzon\n\nMarkov: Life in the Russian Provinces / vDud\n10,542,688 views • Nov 18, 2020\n\nDmitry Markov\nHelp Nochlezhka in Kostroma\nHelp Rostok\nDenis from Porkhov\nA 2016 article about the criminal youth movement AUE in the Baikal region, featuring photos by Dmitry Markov\n\n0:00 What is this episode about?\n1:16 Why does Markov photograph Russia the way he does?\n4:52 Who smartened Dud up a bit?\n9:04 Why did we meet Markov in rehab?\n15:46 The creepy realization that you’re a drug addict\n20:24 Workshops for the mentally disabled\n23:25 “Mom left me at the Three Stations”\n28:18 Leaving Moscow for Pskov and a salary five times less\n33:15 The main problem in the Russian provinces: version #1\n37:55 A Russian bogatyr in 2020\n41:30 Don’t try this at home\n44:06 The main problem in the Russian provinces: version #2\n45:26 “Moscow is distant and different”\n49:00 How much do you earn?\n53:45 Why do we need independent media?\n1:00:06 Russia’s best photographer\n1:02:03 A region where the 90s never ended\n1:06:58 What are Russian orphanages like?\n1:11:22 Lyokha and Dasha\n1:17:37 The main problem in orphanages\n1:24:23 An important argument worth several million eyes\n1:27:37 Why does Russia booze it up?\n1:30:59 From being a paratrooper fighting in hotspots to helping the homeless\n1:33:30 “I was in prison 6 times for a total of 19 and a half years”\n1:35:03 How do people get into the Kostroma Night Shelter for the homeless?\n1:38:38 A Russian star is born\n1:40:07 “I fought for our side, for the Donbass”\n1:45:01 “If everyone thinks that there are no problems, you might believe it yourself”\n1:46:45 Help for the Russian provinces from an unexpected country\n1:51:10 How realtors swindle orphanage kids\n1:55:12 Do you believe in God?\n1:56:51 Dud’s new hairstyle\n2:04:04 What does Markov dream of?\n2:07:21 What has happened to the stars of this episode since we filmed it\n\nTranslated by the Russian Reader\n\n“Pupils at the correctional boarding school in Khilok, involved in the attack on the police station. The children are facing the courtyard of the boarding school, an old Soviet building without running water and sewerage.” Photograph by Dmitry Markov, originally published by Takie Dela in February 2016. Markov mentions the attack on the police station in his interview with Yuri Dud, above", "pred_label": "__label__1", "pred_score_pos": 0.5590632557868958} {"content": "Quantum epileptic Spikes Detection\n\nThe framework of proposed method for MEG signals\n\n\nEpilepsy is a neurological disorder classified as the second most serious neurological disease known to humanity, after stroke. Magnetoencephalography (MEG) is performed to localize the epileptogenic zone in the brain. However, the detection of epileptic spikes requires the visual assessment of long MEG recordings. This task is time-consuming and might lead to wrong decisions. Therefore, the introduction of effective machine learning algorithms for the quick and accurate epileptic spikes detection from MEG recordings would improve the clinical diagnosis of the disease. The efficiency of machine learning based algorithms requires a good characterization of the signal by extracting pertinent features. In this paper, we propose new sets of features for MEG signals. These features are based on a Semi-Classical Signal Analysis (SCSA) method, which allows a good characterization of peak shaped signals. Moreover, this method improves the spike detection accuracy and reduces the feature vector size. We could achieve up to 93.68% and 95.08% in average sensitivity and specificity, respectively. We used the 5-folds cross-validation applied to a balanced dataset of 3104 frames, extracted from eight healthy and eight epileptic subjects with a frame size of 100 samples with a step size of 2 samples, using Random Forest (RF) classifier.\n\nAbderrazak Chahid\nAbderrazak Chahid\nPhD candidiate\n\nMy research interests include feature extraction, real-time implementation of smart decision making systems.", "pred_label": "__label__1", "pred_score_pos": 0.9953529834747314} {"content": " Tel: +86 512 6690 0178\n      E-mail: karryli@belleif.com\nHome » News » Industry Encyclopedia » What Are The Causes of Common Eye Diseases?\n\nWhat Are The Causes of Common Eye Diseases?\n\nViews:395     Author:Site Editor     Publish Time: 2020-10-26      Origin:Site\n\nClinically, the more common eye diseases mainly include eyestrain, red eyes, night blindness, lazy eye, strabismus and nystagmus, colorblindness, uveitis, presbyopia, floaters, dry eyes, excess tearing, cataracts, glaucoma, retinal disorders, conjunctivitis, corneal diseases, eyelid problems, vision changesproblems with contact lenses. The following will analyze the causes of several common eye diseases.\n\n\n\n\nThe causes of eye fatigue are mostly due to prolonged exposure to electronic devices such as computers and mobile phones, incorrect reading posture, and poor personal eye hygiene habits. Generally speaking, in response to this situation, it is recommended that you close your eyes, do eye exercises, massage with the palm of your hand, adjust the brightness and contrast of your phone, etc. If these measures do not relieve the symptoms of eye fatigue, please consult a doctor in time.\n\n\nRed Eyes\n\n\nBloodshot eyes are a symptom of conjunctival hyperemia. There are many reasons, the most common are conjunctivitis, staying up late, and dry eye. When the eye is irritated by inflammation, the blood vessels of the conjunctiva will have hyperemia. If it is a bacterial infection, there will be yellow-white secretions. If it is a viral infection, the secretions are usually white. When the virus invades the cornea, the cornea is formed. In inflammation, the eyes will appear as ciliary hyperemia. These conditions require symptomatic medication.\n\n\nStainless Steel Muscle Forceps\n\nNight Blindness\n\n\nThere are many reasons for night blindness. The more common diseases are retinitis pigmentosa, optic neuropathy, late glaucoma, and vitamin A deficiency. Some patients are also seen after panretinal photocoagulation surgery, congenital achoroid disease, progressive vision, cone rod cell dystrophy, drug poisoning and so on.\n\n\nStrabismus And Nystagmus\n\n\nThe strabismus of the eyes is mainly due to congenital development, and then there are special reasons that cause the eyeball to be incorrectly positioned. Its treatment methods mainly include surgical treatment and non-surgical treatment. For strabismus, the younger the age is, the better the effect of surgical treatment is. Surgery is not only to correct the position of the eyeballs and improve the appearance, but more importantly, to establish binocular vision in children. Precision instruments used in eye surgery include ophthalmic surgical instruments cannula or corneal cannula, straight eye dressing forceps, wire eye speculum and Miltex 5-310 eye scissors with probe points.\n\n\n\n\nPresbyopia is a normal physiological phenomenon that occurs with age and is a stage that everyone must go through. In addition to age factors, presbyopia is often related to factors such as reading habits, physical fitness, race, and living environment. Reading glasses, contact lenses, LASIK can be used to restore good reading vision.\n\n\n\n\nVitreous hemorrhage, retinal detachment, and posterior uveitis are common causes of floating objects in the eye. Doctors will give targeted treatment measures based on a clear diagnosis. If vitreous hemorrhage is large and retinal detachment has occurred, surgery may be required. Miltex 5-310 eye scissors with probe points can play a great role in this kind of surgery. According to different causes of posterior uveitis, corresponding treatments are given. If caused by infection, give anti-infective drugs; because of immune factors, it is best to use immunosuppressive therapy.\n\n\n\n\nCataract refers to a visually impaired disease caused by decreased transparency or color change of the lens. Its pathogenesis is more complicated, and it is the result of the long-term comprehensive effect of internal and external factors on the lens.\n\n\n\n\nGlaucoma is a disease characterized by optic atrophy, visual field defect, and decreased vision. It can be treated with medication, laser treatment and surgery.\n\n\nSurgical scissors commonly used in surgical operations include long surgical scissors, medical clamp scissors, and surgical steel scissors.\n\n\nFor different surgical operations, surgical scissors are not exactly the same, such as blunt nose surgical scissors for rhinoplasty and straight eye scissors for eye surgery.\n\n\nIn summary, we can see that surgical treatment is one of the solutions to many eye problems today. In addition to the several eye diseases mentioned above, eyelid problems, vision changes and problems with contact lenses are also commonly treated with surgery. \n\n\n\n\n\nTel: +86 512 6690 0178\n\n2020 © Belle Healthcare Technology Co., Ltd.", "pred_label": "__label__1", "pred_score_pos": 0.9656716585159302} {"content": "EU ministers exclude nuclear, fossil gas from green transition fund\n\nA combination of photos shows (L-R) the controlled demolition of a cooling tower at a decommissioned nuclear power plant in Philippsburg, Germany, 14 May 2020. [EPA-EFE/RONALD WITTEK]\n\nEuropean Union countries agreed on Wednesday (24 June) that the bloc’s flagship fund to wean regions off fossil fuels should not finance nuclear or natural gas projects, despite calls from some Eastern countries for gas to be eligible for EU funding.\n\nThe European Commission, the EU’s executive, wants to set up a €40 billion Just Transition Fund, comprised of €30 billion from an EU coronavirus recovery fund and €10 billion from its budget for 2021-27.\n\nThe fund aims to encourage a shift from high-carbon industries that would help coal miners to retrain and find new low-carbon jobs, and support regions whose economies depend on polluting sectors to build new industries.\n\nAmbassadors from the EU’s 27 member states agreed on Wednesday that the Just Transition “shall not support the decommissioning or the construction of nuclear power stations” nor “investment related to the production, processing, distribution, storage or combustion of fossil fuels,” according to a document, published on Thursday (25 June).\n\nThe position is in line with the Commission’s, making it likely that the final Just Transition Fund will exclude nuclear and gas.\n\nThe proposal will be finalised following negotiations between member states, the Commission and EU Parliament, with the latter typically favouring ambitious climate change policies.\n\nWith EU leaders still wrangling over the size and shape of the EU’s recovery fund and budget, member states held off agreeing a number for the size of the pot.\n\nWhile transition money is off the table, fossil gas projects could still seek support from other parts of the EU budget and coronavirus recovery funds – so long as those projects “do no harm” to the bloc’s emissions-cutting goals.\n\nEight eastern countries last month urged the EU to include natural gas projects in future funding, which they say they need to shift away from coal power.\n\nNatural gas produces about half as much CO2 as coal when burned in power plants, but gas production is associated with leaks of methane, a potent greenhouse gas. Climate campaigners say new gas plants could stand for decades, threatening the EU’s aim to cut its net emissions to zero by 2050.\n\n\n\nSubscribe to our newsletters", "pred_label": "__label__1", "pred_score_pos": 0.9850520491600037} {"content": "Leadership for Change - Bolman and Deal’s Reframing\n\nBy Dr. Maureen S. Andrade, HCI Research Associate\n\nWhen I was in my doctoral program at USC - the University of Southern California, I took a class from Terry Deal. Dr. Deal is a well-known leadership consultant who has taught courses at a number of universities and is now retired from USC. He is perhaps best known for his book, co-authored with Lee Bolman, called Reframing Organizations, now in its 6th edition.\n\nMuch of what a leader does is related to change and it’s also one of the most challenging aspects of being a leader. If you look at job postings for executive positions, they typically include something about vision, innovation, change, and strategy.\n\nThe reframing model is based on the idea that leaders need to see challenges and opportunities in their organizations through four frames—structural, human resource, political, and symbolic. Through this process, they can envision how a change will impact various aspects of an organization such as its structure and people as well as political and cultural elements.\n\nAdhering to only one frame limits a leader’s perspective and results in inappropriate or ineffective actions. In their book, Bolman & Deal show how executives fail time and time again because they are primarily focused on people or structure or vision while ignoring other critical aspects of their organizations. When you ask people in a job interview about their leadership style or philosophy, you can invariably recognize which frame they are coming from.\n\nThe tendency of leaders to get stuck in a single frame necessitates making a conscious effort to examine all four frames. It is also wise to seek the perspectives of others who may be more skilled at using a different frame. Each frame offers a different view of an organization and helps guide change. We next examine each frame and the metaphor associated with it.\n\nThe structural frame can be compared to a factory. It is related to roles and responsibilities, tasks and deadlines, processes and systems, and how the work gets done. It involves the planning and organizing functions of management. The emphasis is on clarity, control, and coordination.\n\nThe metaphor that best describes the human resource frame is family. This frame focuses on the fit between people and the organization. People want meaningful work and want to feel valued; organizations benefit from their ideas and abilities. Job satisfaction, skill development, autonomy, and motivational factors are considerations associated with this frame.\n\nThe political frame involves considering the diverse beliefs, personalities, values, and interests of the people in an organization. Differences can create conflict. Limited resources and competition require making difficult choices. The metaphor associated with this frame is a jungle. Leaders need to form coalitions, resolve conflict, and consider their power bases.\n\nThe symbolic frame is associated with creating a sense of purpose, inspiring and influencing, articulating a vision, and using stories, traditions, and myths associated with the organization to create connections and commitment. The leader is seen as a prophet or visionary who can engage people’s hearts and minds. The symbolic frame also involves celebrations, events, and rewards. The metaphor associated with this frame is theatre. The symbolic frame emphasizes becoming united through organizational culture and providing direction and stability.\n\nThe reframing model provides a broad perspective on an organization rather than specific steps to follow. Motivational issues can be addressed through the human resource and symbolic frames. Confusion regarding goals or overlapping responsibilities point to the need to emphasize the structural frame. Anxiety, instability, or fear can best be resolved through the symbolic frame. However, with each situation, leaders should look through all four frames to gain insights into what is happening, why, and how to best resolve it.\n\nBolman and Deal’s model ensures that all aspects of an organization are considered in the change process. In my own leadership roles, I have considered the model frequently. Examples includes changing processes, adopting new software, re-organization of departments, and launching new initiatives. If you want to learn more about the frames and which one you are strongest in, Bolman & Deal have a quick instrument on the website for the book.\n\nBest wishes as you apply this model to lead lasting change!\n\nThis blog post is based on Dr. Andrade’s book, Organizational Behavior In Practice. Publishing rights to this content are owned by Great River Learning.\n\n213 views0 comments\n\nOrem, Utah\n\n • YouTube\n • LinkedIn\n • Twitter\n • Instagram\n • Facebook\n\n©2007 - 2020 \n\nby Human Capital Innovations, LLC.", "pred_label": "__label__1", "pred_score_pos": 0.9448752999305725} {"content": "Grade Six\n\n • In grade six, students focus on analyzing texts and on how authors make their point and support arguments with evidence. They examine the structure and content of complex texts and learn how to use language to inform, influence, and express ideas. Students study world geography and look at how geography and resources influenced the migration and habits of primitive cultures. Structure and function are the themes in the science classroom and students observe how structure and function exist in the world around them. They use models and provide evidence to make claims and explanations about structure-function relationships in different science and technology/engineering domains. In mathematics, the focus is on mastery of operations on fractions and integers, and applying these skills to proportional reasoning to quantitative and spatial settings. Performance Tasks include: Cartographers a la Carte; Pizza for Champions; Engineering Design Project; Community Hero.\n\n English Language Arts\n In grade 6, students read proficiently grade-appropriate complex literature and informational while further developing the ability to cite textual evidence to support analyses. Students focus on examining how authors use reasons to make their points and support arguments with evidence, separating unsupported assertions from those backed by evidence. Students analyze both the structure and content of complex, grade-appropriate texts, determining how sentences and paragraphs within texts influence and contribute to the unfolding of a plot and the development and elaboration of events or ideas. Students also share their findings in class discussions, practicing how logically to sequence ideas and highlight the themes and key details they find most persuasive. Students’ vocabularies expand as they become more attuned to using context, knowledge of Greek and Latin roots and affixes, and word analysis to determine the meaning of academic words. Students in grade 6 are increasingly challenged to sharpen their ability to write and speak with more clarity and coherence, providing clear reasons and relevant evidence. In grade 6, students learn how writers try to influence readers while discovering how they can do the same in their own prose. They discover how to answer questions through writing and can use rewriting opportunities to refine their understanding of a text or topic. They also take a critical stance toward sources and apply criteria for identifying reliable information as opposed to mere conjecture.\n\n Social Studies\n Sixth graders study the world outside of the United States and North America. Students systematically learn geography around the world continent-by-continent, similar to the way in which atlases are organized. They also learn about each continent in an order that reflects, first, the early development of the river valley civilizations and then the later development of maritime civilizations in the Mediterranean area and in Northern and Western Europe. In so doing, students are better prepared for the study of early civilizations around the Mediterranean area in grade seven.\n\n In grade 6, the focus for student learning is on four critical areas: (1) connecting ratio and rate to whole number multiplication and division, and using concepts of ratio and rate to solve problems; (2) completing understanding of division of fractions and extending the notion of number to the system of rational numbers, which includes negative numbers; (3) writing, interpreting, and using expressions and equations; and (4) developing understanding of statistical thinking. The focus is the mastery of operations on fractions and integers and applying these skills to proportional reasoning to quantitative and spatial settings.\n\n Science and Technology/Engineering\n Structure and Function In Grade 6 students inquire about the structure and function of the world around them. The integration of earth, life, and physical sciences with technology/engineering gives students relevant and engaging opportunities with natural phenomena and design problems that provide the foundation for more abstract and complex topics through grade 7 and 8. Grade 6 students start with a framework that relates structure and function of the macro and microscopic world and introduces scale and time in all science and technology/engineering domains. Students use models and provide evidence to make claims and explanations about structure-function relationships in different science and technology/engineering domains.\n\n The Unified Arts\n One of the primary goals of the unified arts instruction is to develop and expand children's natural abilities of perception, movement, interpretation, and appreciation of the forms, sounds, and language of creativity. The curriculum is designed to encourage a positive attitude and, perhaps, a lifelong interest in all of the unified arts disciplines. By participating in active experiences, working collaboratively with classmates and teachers, and presenting their work to the larger community, our students gain the technical and aesthetic foundation to be culturally literate citizens of the world.\n\n World Language\n Students will take Spanish and Latin in each of their three years at Monomoy Middle School. Students will expand on the Spanish language skills acquired at the elementary level. Spanish, as the nation's second language, gives every proficient speaker a valuable skill and a connection to world conversations. A foundational understanding of Latin opens the door to all Romance Languages and strengthens understanding of the roots of language and appropriate usage. Latin will extend skills addressed in the English Language Arts classes.\n\n Visual Arts\n Using a variety of ways to explore, learn, and communicate, students develop their capacity for imaginative and reflective thinking. The visual arts includes drawing, painting, photography,\n printmaking, and sculpture; the design fields include industrial, ceramic, textile, furniture, and graphic design. Visual arts is a continuously evolving field that also explores technologies such as film, video, and other electronic forms of image-making.\n\n Through music education students become fluent in the language of music as artistic, intellectual, and cultural expression. Performing, creating, and responding to music provide means for development and growth. Fluency in music brings understanding of contemporary and historical cultures, as well as self-knowledge. Music includes forms such as folk, popular, band and orchestral music, gospel music, oratorio, jazz, opera, and musical theatre.\n\n Our physical education program is designed to support students’ self-image, build sportsmanship, and provide a basis for a healthy lifelong attitude toward fitness. Our curriculum is carefully sequenced to match the stages of physical, social, and emotional development from year to year. In addition to athletic skills, our program encourages creative expression, builds social concepts such as sportsmanship, cooperation, and fair play, offers opportunities for leadership, encourages children to take risks, and fosters a sense of well-being in a non-competitive setting.\n\n Students in grades five through seven engage in progressively more sophisticated engineering design challenges from the construction of simple name plates to bridges to air powered cars. Essential questions include: How do material characteristics affect tool choice and use? How do properties and characteristics of materials affect design and production in the building of prototypes? How can ideas be communicated through various media? How can you apply the Universal Systems model to transportation?", "pred_label": "__label__1", "pred_score_pos": 0.9846125245094299} {"content": "\n\nGoogle search volume for \"oven\"\n\nWebsite results for \"oven\"\n\n 817 websites found\n\nNot available.\n#8,505 (+3%) -\n#42,814 (+22%) -\nTitle: Sears Outlet - Discounted Appliances, Refrigerators, Ovens, Ranges\nDescription: Slightly Imperfect. Perfect Prices. Get new & reconditioned appliances, refrigerators, ovens, ranges, washers, dryers & more at up to 50% off regular retail prices. Shop online or in store today!\n#42,938 (-6%) -\nTitle: Appliance Parts, Lawn Mower Parts, Vacuum Cleaner Parts -\nDescription: Shop for appliance parts, lawn mower parts and vacuum cleaner parts. Fast, guaranteed delivery. One million parts for 118 brands. Open 7 days a week.\n\nNot available.\n#0 (0%) -\nTitle: Gigi's Hollydale Appliance & Reporcelain\nDescription: Reporcelain specialists, restoration and sales of antique stoves and appliances, new , used and rare parts, custom filters, corporate accounts ok, nationwide shipping, sandblasting, furnace baked,\nKeywords:reporcelain, stoves, o'keefe and meritt, roper, reno, condo, kitchen, wedgewood, western holly, service, gigi, hollydale, south gate, long beach, california, ca, ny, usa, parlor, restored, restore, repair, museum, quality, old,\n... (View More)\n#155,509 (-27%) -\nTitle: The Hungry Mouse. A visual guide to food and cooking. Tasty, fresh content from Jessie's kitchen.\nDescription: Learn to cook with Jessie's step-by-step photo recipes. Expect fresh content, every day. The Hungry Mouse features recipes, tutorials, articles on food, shopping, cookbook and restaurant reviews. Go have a nibble!\nKeywords:step by step cooking, step by step recipes, how to cook, learn to cook, visual guide to cooking, guide to cooking, professional guide to cooking, photo recipes, ribs recipes, rib recipes, how to bake bread, bread recipes, dessert recipes, how to make homemade marshmallows, marshmallow recipes, how to make buttermilk, buttermilk recipes, white chocolate chip cookie recipes, white chocolate chip cookies, how to roast, homemade peanut butter cups, how to make ice cream, ice cream recipes, jessica konopa, jessie konopa,\n... (View More)\nfood writing, professional food writer, professional food writing, online food magazine, food magazine, the angry chef, boston cooks, food bloggers in boston, boston bloggers, boston food bloggers, cambridge food bloggers, massachusetts food bloggers, learn to cook, cooking school, how to cook rice, rice recipes, cookie recipes, pie recipes, homemade irish cream, cooking tutorial, boston copywriters, best cookie recipes, best pie recipes, best ribs recipes, best rib recipes, meat recipes, how to cook meat, best steak recipes, how to cook lamb, how to cook pork, cooking, food, recipes, recipe, how to cook, homemade, baking, cocktails, cocktail, Boston, Cambridge, Boston food blog, Boston foodie, martini, martinis, wine, champagne, cider, liquor, infusion, infused liquor, meat, meatball, meatballs, homemade meatballs, chicken, pork, beef, kurobuta pork, organic, organic cooking, organic living, organic food, organic foods, whole grain, whole grains, seasonal food, seasonal cooking, eat local, slow food, vegan, vegetarian, gluten free, GFCF, wagyu beef, kobe beef, brownies, cookies, oatmeal cookie, oatmeal cookies, chocolate chip cookies, oven, chocolate, chocolate chip, caramel, sweet, snacks, sandwich, bread, how to bake bread, homemade bread, rolls, peanut butter, pancakes, waffles, cake, cupcake, cupcakes, cheese, yogurt, grocery, grocery shopping, groceries, whole foods, chili, marshmallow, pizza, ice cream, homemade ice cream, sherbert, frozen yogurt, gelato, icing, frosting, homemade pizza, dough, batter, apple, apple pie, apple galette, foodie, ribs, spare ribs, roast, roasting, BBQ, barbecue, grill, grilling, bento, salt, bento box, lunch, dinner, entertaining, garlic, ginger, tea, coffee, restaurant, restaurant review, restaurant reviews, product review, product reviews, food, food writing, blog, food blog, blogger, food blogger, food bloggers, food review, food reviews, culinary, gastronomy, dining, natural foods, kitchen, photography, food photography(View Less)\n#209,689 (-33%) -\nTitle: RedAd Singapore Classified\nDescription: Singapore Most Popular Free Classified for various products and services, Buy and Sell Anything\n#37,849 (-10%) -\nTitle: Wood pizza oven Building wood burning brick bread ovens\n#177,935 (-2%) -\nTitle: UK Whitegoods\nDescription: UK Whitegoods Appliance Help, Advice, Repairs, Spare Parts & More\n#143,953 (+21%) -\nTitle: Pizza Oven | Brick Oven | Wood-Fired Pizza Ovens\nDescription: Italian brick pizza ovens for the home and garden, restaurants and pizzerias; wood and gas-fired. Outdoor masonry fireplaces, and accessories, including oven peels and baking stones.", "pred_label": "__label__1", "pred_score_pos": 0.975473940372467} {"content": "#Open journalism No news is bad news\n\n\nSupport The Journal\nDublin: 6°C Monday 18 January 2021\n\nWhy a fatal Porsche crash is causing uproar in Iran\n\nIt has led to talk about inequality in the country.\n\nA HIGH-SPEED Porsche crash has become a symbol of growing inequality in Iran, with even the country’s top religious leader speaking out against corruption that has spawned extreme wealth for the 1%.\n\nThe New York Times reports that in Iran, “a new class of untouchable 1 percenters hoards money, profiting from sanctions and influential relations, leaving Iran’s middle classes to face the full force of the country’s deepening economic woes”.\n\nThe crash\n\nLast month, a 20-year-old woman from a poor part of Tehran crashed a yellow Porsche carrying the 21-year-old grandson of a high-ranking religious cleric in Iran. They both died instantly.\n\nWhen photos of the wreckage appeared on social media, Iranians started criticising Parivash Akbarzadeh and the grandson, Mohammad Hossein Rabbani-Shirazi.\n\nOne commenter wrote on Instagram, according to The Times:\n\nThank God that even when there is no justice in this world in distributing money and wealth, there is justice in death. I love God’s justice that rich and young people also die along with the desperate poor people who have no hope in life.\n\nIran’s supreme leader, Ayatollah Ali Khamenei, even commented on the controversy, saying that young rich people showing off their wealth “creates psychological insecurity in the society.”\n\nThe gap between rich and poor\n\nOutrage over the widening gap between rich and poor has been building in Iran for years.\n\nAnother sign of the exorbitant wealth among Iran’s elite made the news in 2011.\n\nThe Washington Post reported that Iran’s wealthy had taken to eating ice cream covered in edible gold. Despite the country’s promise to distribute its oil wealth evenly, only a small group of well-connected Iranians have benefitted.\n\nThe Financial Times wrote in 2013 that Iran’s economy had been hurt by US and European Union sanctions, noting that as much as 40% of Iranians lived below the poverty line, a dramatic increase since 2005, when that figure was about 22%.\n\nLuxury cars have become a particularly powerful symbol of the economic inequality in the country. AFP reported in 2012 that Iran was seeing a “luxury car boom,” with people paying as much as $360,000 for the high-end vehicles because of a high import tax.\n\nAFP noted that working-class Iranians were then having to survive on an average monthly salary of $700.\n\nRead: This map proves that Iran doesn’t really want to defeat ISIS in Iraq and Syria>\n\nPublished with permission from:\n\nBusiness Insider\n\nRead next:", "pred_label": "__label__1", "pred_score_pos": 0.9145287871360779} {"content": "The Truth About Calcium And Anemia\n\n\nAs any physician or nutritionist would be quick to advise the pregnant woman, the food that she eats, and the diet that she has, will have a crucial impact on the long term success of her pregnancy, along with the health of her unborn child and so, it is for that precise reason then, that it is crucial that the pregnant woman educates herself as to the manner in which her body works.\n\nIt should be noted that one of the main risks that a woman will face during the course of her pregnancy is the onset of anemia and if left unchecked, this can be a major problem to the unborn child as well as the mother due to the fact that the mother faces the risk of developing heart failure in the future.\n\nCalcium Food\n\nHowever, women may actually be increasing their chances of acquiring anemia due to the fact that they are taking supplements that can clash and inhibit the rate and effectiveness of which the body will be able to absorb the iron into the bloodstream. This issue is considered in more details as is follows.\n\nWhat supplements can place the female at risk during pregnancy?\n\nThis may come as something of a surprise but the truth of the matter is this: calcium interferes with the ability of the body to absorb iron from the food and specifically, it will actually prevent the body from doing so at all. Given that a woman has to increase the amount of iron in her diet during pregnancy to prevent anemia for both herself as well as her child, this is an issue that any expecting mother should be aware of.\n\nCalcium Suppliments\n\nTherefore, calcium supplements of any sort should be carefully controlled and regulated during the pregnancy. However, problems also rise from the fact that it is not only calcium supplements, but calcium that has been derived from the food we eat, that poses a potential threat to the iron consumption process, and by extension then, the risk of anemia. With that in mind then, it is important that expectant mothers follow the instructions of the physician closely.\n", "pred_label": "__label__1", "pred_score_pos": 0.6902763843536377} {"content": "CONTACT US Wed Nov. 13, 2013\n\n\n .  >  FOCUS  >  ECOLOGY\n\n Stopping illegal wildlife trade requires online efforts\n\n Author  :  ZHU CHANGJUN     Source  :    Guangming Daily     2020-04-16\n\n Recently, the Standing Committee of the National People's Congress made a decision to thoroughly ban the consumption of wild animals. This move aims to severely crack down on the illegal wildlife trade. However, people in charge of biodiversity conservation groups warned that combating illegal wildlife trading still faces a big challenge posed by the online illegal wildlife trade, because the internet has provided illicit business with increased opportunities for privacy and there isn’t enough regulation specifying the responsibility of online platforms. As China plans to amend the Law of Wild Animal Protection, it is necessary to specify the responsibility of online platforms into law, urging them to step up their monitoring mechanisms; otherwise, they shall be held jointly liable for illicit wildlife businesses.\n\n Based on the current situation and trends of the illicit wildlife business, the authorities, academia and animal protectors have already reached a consensus that cracking down on the illegal trade of wild animals needs increased strength in the cooperation of online and offline forces. According to a report released in 2016 on the online trade of prohibited wildlife products in China, 30.6 percent of the sale of prohibited wildlife products between January and May in 2015 involved online transactions, and it rose to 46.3 percent in 2016. As the physical markets come under increased pressure of monitoring regulation, illicit wildlife business may be shifted online. Even during the epidemic outbreak, there are still prohibited wildlife products being traded online.\n\n The stronger supervision imposed upon the physical markets, the more effort needed to prevent the illegal trade from shifting to online markets. Online business tends to be more private and convenient, making it increasingly hard to detect and disrupt the illicit wildlife business. Some environmental protection volunteers have noted that argot is frequently used in trading prohibited wildlife products, such as an image of an elephant with a caption of “feiliao” or “guodongliao” (both are the argots of ivory of different colors). These cases require a higher capacity of enforcing targeted measures and screening for online clues. Moreover, there has been illegal sale of wild animals conducted under the cover of pet trade in recent years, thus creating enormous difficulty for curbing illegal activities.\n\n Obviously, joint online and offline efforts are crucial to combating the illegal wildlife trade. It is necessary to clarify the online platforms’ responsibility for curbing the illegal wildlife trade by law. Online platforms should take responsibility, and they could do much better with their technological advantages. Specifying the responsibility of online platforms also needs policy and lawmaking support. For example, the “final list” of the wild animals allowed to be legally raised, sold and traded under China’s licensing system has still to be worked out. It would be hard for online platforms to take targeted measures unless they knew exactly what is legal or prohibited.\n\n Regulators should also build efficient mechanisms of communication and cooperation with online platforms. Some online trade chains may be dug out through investigations into offline illegal trade, and most of the online sales of prohibited items are usually accompanied by offline actions, such as poaching and trafficking. The creation of an efficient system to tackle every link of the trade chain is crucial to stamping out the trade. Studies show that certain websites for collecting tip-offs of illegal trade could help online platforms obtain clues and evidence, which can be shared in time with the regulator. In this way, non-governmental organizations and volunteers, such as animal protection groups, would know much better about what and how they can contribute to the combat against the illegal wildlife trade, thus forming a more comprehensive and efficient coordinating mechanism among various players.\n\n\n The article was edited and translated from Guangming Daily.\n\n\n (Edited and translated by Ren Guanhong)\n\n Editor: Yu Hui\n\n >> View All\n\n Interview with Wang Gungwu on significance of studying overseas Chinese\n\n\n >> View All\n\n\n\n\n\n\n\n Application Essentials\n\n Second-hand housing", "pred_label": "__label__1", "pred_score_pos": 0.9792768955230713} {"content": "Lisa leslie net worth\n\nAt the age of 14, before Leslie had even started high school at Morningside, she received more than a hundred college recruiting letters. Lisa Leslie Height – How tall – CelebHeights. Standing six feet tall in seventh grade, Leslie hated it when people would ask her if she played basketball. Education ‎: ‎University of Southern California, M. Lisa realized that being tall was no enough of an advantage, so she began playing with her. Olympic gold medalist and 8 time All star Lisa Lesie was the first woman to dunk in the WNBA.\n\nUPS, Leslie finally returned his call after hearing his. She grew up in Compton, California, a city near Los Angeles.\n\nLisa leslie age\n\nLisa leslie wnba salary\n\nLisa leslie salary\nLeslie, at age 20, was also the youngest player to participate at the USA. In fact, the former WNBA superstar had reached the six- foot mark by the time she was in middle school. She started her career as a college. Lauren Jolie Lockwood and Mich. Husband ‎: ‎Micahel Lockwood How tall is Lisa leslie really? She was a great player and a very tall lady. For me, being tall was very positive because I thought my mom was the most beautiful person.\n\nThe Height in Centimeter (CMS): 196. A collection of facts with age. Ultimate online resource for tall ladies focusing on shoes in large sizes.\n\nLisa leslie shoe\n\nLisa leslie modeling\nAwkwardly navigating the halls of Green Year Round Elementary School, I found it necessary to. Lisa Deshaun Leslie -Lockwood (born July 7,, in Gardena, California) is a former She is a three-time WNBA MVP and a four-time Olympic gold medal winner. At 6-5, she would be considered tall on a boys basketball team. As theAllStar game drew near, Leslie was not playing aswellas she usually did. Western Conference AllStars were 6′3′′. The BET Honors aired last night, but were held on January 12th at Warner Theatre in Washington DC. Jakes, Halle Berry, Clarence Avant and. Allocated to her hometown team, Leslie captained the Los Angeles. The retired WNBA player recently shared pictures of her son.\n\nMy Shot: Balancing It All and Standing Tall. See more ideas about Lisa leslie, Wnba and Basketball. Already six feet tall in the seventh grade, Leslie disliked it when people asked. Personal attacks towards members are not allowed. Demeaning comments based on race, gender, height, sexual orientation, or other. Visual ArtOriginal WorkTraditional. Not to stereotype, but tall women often have some specific. I was waiting for someone and saw her and her team loading their coach and getting ready to disembark. Share motivational and inspirational quotes by LISA LESLIE.\n\nDiscover LISA LESLIE famous and rare quotes.", "pred_label": "__label__1", "pred_score_pos": 0.9499669075012207} {"content": "Hope Opens\n\nHope is a powerful ingredient in transformation.  It is the first sparkle of light in the psyche and aura that begins to break through mental and energetic blocks in the way of manifesting greater happiness and Love.  If we do not allow ourselves to hope, and then build a dream, our angels have a very difficult time manifesting with us.  As many wise people have said through out history, if we wish to create it, we must first allow ourselves to dream it.  In truth, Dreams are collaborative efforts between out higher self, angels and conscious self towards a higher vibration of being.\n\nI have often observed that when a person begins to talk about their ‘ideal scenario’ for career, self expression, abundance or relationship, there physical bodies go from rigid to relaxed, and their energy changes from frozen to fluid movement.\n\nTake a moment today to allow yourself to Hope.\n\nTo hope that those in government awaken on a deeper spiritual and heart level, to make decisions that benefit the planet and the ‘all’.   Hope that opportunities present themselves that allow you to receive and allow greater abundance in your life, a more fulfilling career, supportive friendships and family interactions or more colour within yourself and environment during a long winter or hope that an affordable home magically appears for yourself or loved ones.  There are miracles waiting to happen in your life.\n\nHope is a gleaming white light that expands around your crown chakra, and extends down to the ground, and reaches up into the sky.  It is the gateway to Dreaming into being a better world for yourself and on a universal level. Like a matrix of light between the angels, the divine and yourself, Hope moves most freely between the physical and etheric levels, hand in hand with Love. We all deserve Hope, allow it into your day today.\n\n\nwith light,\n\n\nfor further exploration of hope, and manifesting a positive future please visit ‘Soul Evolution’ (Buy Now) Soul Evolution by Kamia Shepherd\n\n\n\nInnocence and Relationship\n\n\n\n\n\n\nwith Love\n\n\n\n1636ddd8cee48de6cf8e51899ab9be7cA Medicine Wheel\n\n\nartwork by Jane Shepherd, artist retains copyright\n\nAcknowledging and Allowing for ‘More’\n\nThe light in the sky is still soft, the clouds moving away from the mountains like a foamy ocean wave off of the shore.  As I am doing my own spread of cards, I feel the soft angelic presence of of one of the angels suggesting it is a good morning to share a card with the world.\n\nAfter completing my own spread, I am drawn to work with the Goddess Guidance Oracle deck.  The card the reveals itself is Rhiannon and the card has colors like the morning sky.  Magical soft grays and blues that we often see at dawn and dusk, the hours when many believe the veil between the worlds, and between the conscious and subconscious mind are thinnest.\n\nThe card speaks of the desire and need for people to find and believe in ‘something more’.  Something more then they see with their physical eyes, a form of faith, guidance or assurance that there is more in life and that they are connected to and have access to it.  I say with absolute assurance, there is more, and yes, we are all connected to ‘it’.\n\nThe world is full of magical moments, the comment or song we overhear that uplifts us when we need it most, the person we meet for the first time but recognize as an old friend, the sudden smell of flowers when we are walking through a winter landscape, and the heart shaped cloud in the sky, are all moments of ‘magic’.\n\nEvery person has the potential to connect with their own inner guidance, to hear their angels and guides and to feel the light and love in the universe.  Though it can seem daunting, and the ego may yell the opposite, we are all born with a sixth sense.  If you are reading this, you are a magical person.  You can, as the card reads “manifest clear intentions into reality.” If you are new to the path of believing in your own guidance, ordering a book from the library, getting your own deck of cards, or enrolling in an energy based workshop are all steps that can be taken to honor the emergence of your faith in yourself and your receptivity.  A walk to a place in nature that feels like a power spot for you, is also a free way to connect with your higher self.\n\nLet your life have magical moments, and they will increase.  Thank your guides when those moments occur and remember to give yourself positive reinforcement for believing in them.  Ancient cultures believed in ‘more’, the knowledge and faith is still encoded in the strands of DNA in your body, and the body of the earth.  Trust yourself, be loving as you journey forwards, and allow a little loving magic into the way you experience the world today.\n\n\nMay your blessings manifest in gentle, loving, and magical ways,\n\n\n*for further transformative and inspiring messages visit ‘Soul Evolution’ by Kamia Shepherd (Buy Now)\n\n\nPrayer for a Brighter Future\n\nby Jane Shepherd\nacrylic by Jane Shepherd\n\nI pray to the creator, god and goddess, the angels, spirit guides and higher selves of the collective unconscious, that the people and government of Canada come together to form a more unified belief and mandate of environmental preservation, human rights including First Nations, and kindness to one another.\n\nI pray for respect, fair dealings and allocations of funds to begin to constructively address the many injustices and damages that have been thrust on First Nations peoples.\n\nI pray that we all come together energetically to make choices that honor the future of a healed planet and choose innovative energy sources, supporting our populace with newly created jobs that allow us to believe in the universal rightness and good of our actions and tasks.\n\nI pray and join others in their prayers for the celebration of our natural resources and the desire to honor nature, instead of destroying her.  I pray that peoples of Canada and the World feel loved and supported by the earth and one another so that they may choose daily, to support the earth and each other.\n\nI ask for the help of the christ consciousness in spreading this prayer, and that if you are reading it, you take a moment to acknowledge the beautiful light in your neighbors, your community members, and your fellow countrymen and women regardless of their race, gender or income.\n\nWhen we acknowledge and speak to the soul purpose in others, we begin to connect and benefit the whole instead of the individual.\n\nThank You.\n\nFor further exploration of effecting positive changes through prayer please visit  blog post “This Prayer is for People”\n\nor ‘Soul Evolution’ by Kamia Shepherd (Buy Now)\n\nClick Here to Buy Now ‘Soul Evolution through Amazon.com\n\n\nLet your Light be Supported While It Shines!\n\nSometimes people can feel ‘stuck’ in the place or situation that they are presently in.  This can manifest as a town or city one calls home, a relationship such as a friendship, or a job.\n\nHere is a message from the angels: You are the divine creator of your Destiny and Wellbeing!\n\nMost people, when they are sitting quietly somewhere they consider a ‘sacred space’ are completely aware of the steps their angels are urging them to take, that would effect and change the present reality they are unhappy with.  This can be a message about getting a part-time job to bring in extra abundance that would allow them to save for a much needed vacation to a place on the planet they feel as a power spot for ‘recharing’ their vital energy.  Or as a message about creating healthier boundaries or ending a friendship with someone who is more comfortable recieving than giving or vice versa. When we are honest with ourselves, about what needs to occur to make more space for joy and fulfilment, the answers we ‘receive’ add to that sense of peace, hope and safety.  The messages we give ourselves about ‘can’t, won’t shouldn’t’, are often just our ego talking.\n\nYour personal angels want you to experience this earth-plane with delight, comfort and love!  Your guides, higher self and inner light are attracted and inspired each time you honour one of your own intuitive messages regarding better health and life choices.  Celebrate yourself and go to that power spot, take a different job, form a new friendship, and honour your body with sleep, healthful eating and positive messages.  You deserve it!\n\n‘Soul Evolution’ by Kamia Shepherd (Buy Now)\n\n\nBlog at WordPress.com.\n\nUp ↑\n\n%d bloggers like this:", "pred_label": "__label__1", "pred_score_pos": 0.7223170399665833} {"content": "Ideas for everyone\n\nCrainstorm is a real-time, crowd-sourced brainstorming tool that lets you gather insights and input from marketers, entrepreneurs, creators and innovative thinkers. Home to 100+ Marketers and Innovators.\n\nCrainstorm just launched and is in a BETA stage. You may encounter some bugs or issues as things take shape. We welcome your feedback!\n\nHow it Works\n\n 1. Host - Create a brainstorm event by clicking \"Host a Brainstorm\" at the top of your screen. Provide some background info, set a budget, decide how many folks you want in your meeting, and set a date and time.\n 2. Hire - Invite some relevant participants to apply to your brainstorm, wait for applicants to roll in and review, select and approve your contributors.\n 3. Brainstorm - When the time comes, start your event and collaborate, ideate and get some new and fresh insights on a challenge you’re trying to solve.\n\nGenerate ideas and gather input. There's a Crainstorm for anything.\n\nBecome a Crainstormer\n\nAre you a marketer, innovator, creative or someone with an opinion on everything? Join our network of hundreds of brainstormers, search and apply for brainstorms and contribute ideas and insights to those who need them.", "pred_label": "__label__1", "pred_score_pos": 0.8384615778923035} {"content": "Learning to Generate Questions by Learning What not to Generate\n\n02/27/2019 ∙ by Bang Liu, et al. ∙ 0\n\nAutomatic question generation is an important technique that can improve the training of question answering, help chatbots to start or continue a conversation with humans, and provide assessment materials for educational purposes. Existing neural question generation models are not sufficient mainly due to their inability to properly model the process of how each word in the question is selected, i.e., whether repeating the given passage or being generated from a vocabulary. In this paper, we propose our Clue Guided Copy Network for Question Generation (CGC-QG), which is a sequence-to-sequence generative model with copying mechanism, yet employing a variety of novel components and techniques to boost the performance of question generation. In CGC-QG, we design a multi-task labeling strategy to identify whether a question word should be copied from the input passage or be generated instead, guiding the model to learn the accurate boundaries between copying and generation. Furthermore, our input passage encoder takes as input, among a diverse range of other features, the prediction made by a clue word predictor, which helps identify whether each word in the input passage is a potential clue to be copied into the target question. The clue word predictor is designed based on a novel application of Graph Convolutional Networks onto a syntactic dependency tree representation of each passage, thus being able to predict clue words only based on their context in the passage and their relative positions to the answer in the tree. We jointly train the clue prediction as well as question generation with multi-task learning and a number of practical strategies to reduce the complexity. Extensive evaluations show that our model significantly improves the performance of question generation and out-performs all previous state-of-the-art neural question generation models by a substantial margin.\n\n\n\nThere are no comments yet.\n\n\npage 1\n\npage 2\n\npage 3\n\npage 4\n\nThis week in AI\n\n\n1. Introduction\n\nAsking questions plays a vital role for both the growth of human beings and the improvement of artificial intelligent systems. As a dual task of question answering, question generation based on a text passage and a given answer has attracted much attention in recent years. One of the key applications of question generation is to automatically produce question-answer pairs to enhance machine reading comprehension systems \n\n(Du et al., 2017; Yuan et al., 2017; Tang et al., 2017; Tang et al., 2018). Another application is generating practice exercises and assessments for educational purposes (Heilman and Smith, 2010; Heilman, 2011; Danon and Last, 2017). Besides, question generation is also important in conversational systems and chatbots such as Siri, Cortana, Alexa and Google Assistant, helping them to kick-start and continue a conversation with human users (Mostafazadeh et al., 2016).\n\nFigure 1. Questions are often asked by repeating some text chunks in the input passage, while there is great flexibility as to which chunks are repeated.\n\nConventional methods for question generation rely on heuristic rules to perform syntactic transformations of a sentence to factual questions\n\n(Heilman, 2011; Chali and Hasan, 2015)\n\n, following grammatical and lexical analysis. However, such methods require specifically crafted transformation and generation rules, with low generalizability. Recently, various neural network models have been proposed for question generation\n\n(Du et al., 2017; Zhou et al., 2017; Hu et al., 2018; Kim et al., 2018; Gao et al., 2018). These models formulate the question generation task as a sequence-to-sequence (Seq2Seq) neural learning problem, where different types of encoders and decoders have been designed. Like many other text generation tasks, the copying or pointer mechanism (Gulcehre et al., 2016) is also widely adopted in question generation to handle the copy phenomenon between input passages and output questions, e.g., (Zhou et al., 2017; Yuan et al., 2017; Subramanian et al., 2017; Kim et al., 2018; Song et al., 2018). However, we point out that a common limitation that hurdles question generation models mainly use copying mechanisms to handle out-of-vocabulary (OOV) issues, and fail to mark a clear boundary between the set of question words that should be directly copied from the input text and those that should be generated instead.\n\nIn this paper, we generate questions by learning to identify where each word in the question should come from, i.e., whether generated from a vocabulary or copied from the input text, and given the answer and its context, what words can potentially be copied from the input passage. People usually repeat text chunks in an input passage when asking questions about it, and generate remaining words from their own language to form a complete question. For example, in Fig. 1, given an input passage “Today, Barack Obama gives a speech on democracy in the White House” and an answer “Barack Obama”, we can ask a question “The speech in the White House is given by whom?” Here the text chunks “speech” and “in the White House” are copied from the input passage. However, in the situation that a vocabulary word is an overlap word between a passage and a question, existing models do not clearly identify the underlying reason about the overlapping. In other words, whether this word is copied from the input or generated from vocabulary is not properly labeled. For example, some approaches (Zhou et al., 2017) only take out-of-vocabulary (OOV) words that are shared by both the input passage and target question as copied words, and adopt a copying mechanism to learn to copy these OOV words into questions. In our work, given a passage and a question in a training dataset, we label a word as copied word if it is a nonstop word shared by both the passage and the question, and its word frequency rank in the vocabulary is lower than a threshold. We further aggressively shortlist the output vocabulary based on frequency analysis of the non-copied question words (according to our labeling criteria). Combining this labeling strategy with target vocabulary reduction, during the process of question generation, our model can make better decisions about when to copy or generate, and predict what to generate more accurately.\n\nAfter applying the above strategies, a remaining problem is which word we should choose to copy. For example, in Fig. 1, we can either ask the question “Who gives a speech today?” or the question “The speech in the White House is given by whom?”, where the two questions are related to two different copied text chunks “today” and “White House”. We can see that asking a question about a passage and a given answer is actually a “one-to-many” mapping problem: we can ask questions in different ways based on which subset of words we choose to copy from input. Therefore, how to enable a neural model to learn what to copy is a critical problem. To solve this issue, we propose to predict the potential clue words in input passages. A word is considered as a “clue word” if it is helpful to reduce the uncertainty of the model about how to ask a question or what to copy, such as “White House” in question 2 of Fig. 1. In our model, we directly use our previously mentioned copy word labeling strategy to assign a binary label to each input word to indicate whether it is a clue word or not.\n\nTo predict the potential clue words in input, we have designed a novel clue prediction model that combines the syntactic dependency tree of an input with Graph Convolutional Networks. The intuition underlying our model design is that: the words copied from an input sentence to an output question are usually closely related to the answer chunk, and the patterns of the dependency paths between the copied words and answer chunks can be captured via Graph Convolutional Networks. Combining the graphical representation of input sentences with GCN enables us to incorporate both word features, such as word vector representation, Named Entity (NE) tags, Part-of-Speech (POS) tags and so on, and the syntactic structure of sentences for clue words prediction.\n\nTo generate questions given an answer chunk and the predicted clue words distribution in an input sentence, we apply the Seq2Seq framework which contains our feature-rich sentence encoder and a decoder with attention and copy mechanism. The clue word prediction results are incorporated into the encoder by a binary feature embedding. Based on our multi-task labeling strategy, i.e., labeling for both clue prediction and question generation, we jointly learn different components of our model in a supervised manner.\n\nWe performed extensive evaluation on two large question answering datasets: the SQuAD dataset v1.1 (Rajpurkar et al., 2016) and the NewsQA dataset (Trischler et al., 2016). For each dataset, we use the answer chunk and the sentence that contains the answer chunk as input, and try to predict the question as output. We compared our model with a variety of existing rule-based and neural network based models. Our approach achieves significant improvement by jointly learning the potential clue words distribution for copy and the encoder-decoder framework for generation, and out-performs state-of-the-art approaches.\n\nFigure 2. An example to show the syntactic structure of an input sentence. Clue words “White House” and “today” are close to the answer chunk “Barack Obama” with respect to the graph distance, though they are not close to each other in terms of the word order distance.\n\n2. Problem Definition and Motivation\n\nIn this section, we formally introduce the problem of question generation, and illustrate the motivation behind our work.\n\n2.1. Answer-aware Question Generation\n\nLet us denote a passage by , a question related to this passage by , and the answer of that question by . A passage can be either an input sentence or a paragraph, based on different datasets. A passage consists of a sequence of words where denotes the length of . A question contains words from either a predefined vocabulary or from the input text\n\n. The task is finding the most probable question\n\ngiven an input passage and an answer:\n\nFigure 3. An example from the SQuAD dataset. Our task is to generate questions given an input passage and an answer. In SQuAD dataset, answers are sub spans of the passages.\n\nFig. 3 shows an example of the dataset used in our paper. Note that the answer of the question is limited to sub spans of the input passage. However, our work can be easily adapted to the cases where the answer is not a sub span of the input passage by adding an extra answer encoder.\n\n2.2. What to Ask: Clue Word Prediction\n\nEven given the answer of a desired question, the task of question generation is still not a one-to-one mapping, as there are potentially multiple aspects related to the given answer. For example, in Fig. 2, given the answer chunk “Barack Obama”, the questions “The speech in the White House is given by whom?”, “Who gives a speech on democracy?”, and “Today who gives a speech?” are all valid questions. As we can see, although these questions share the same answer, they can be asked in different ways based on which word or phrase we choose to copy (e.g., “White House”, “democracy”, or “today”).\n\nTo resolve this issue, we propose to predict the potential “clue words” in the input passage. A “clue word” is defined as a word or phrase that is helpful to guide the way we ask a question, such as “White House”, “democracy”, and “today” in Fig. 2\n\n. We design a clue prediction module based on the syntactical dependency tree representation of passages and Graph Convolutional Networks. Graph Convolutional Networks generalize Convolutional Neural Networks to graph-structured data, and have been successfully applied to natural language processing tasks, including semantic role labeling\n\n(Marcheggiani and Titov, 2017), document matching (Liu et al., 2018; Zhang et al., 2018a), relation extraction (Zhang et al., 2018b), and so on. The intuition underlying our model design is that clue words will be more closely connected to the answer in dependency trees, and the syntactical connection patterns can be learned via graph convolutional networks. For example, in Fig. 2, the graph path distances between answer “Barack Obama” to “democracy”, “White House”, and “today” are , , and , while the corresponding word order distances between them are , , and , respectively.\n\n2.3. How to Ask: Copy or Generate\n\nAnother important problem of question generation is when to choose a word from the target vocabulary and when to copy a word from the input passage during the generation process. People tend to repeat or paraphrase some text pieces in a given passage when they ask a question about it. For instance, in Fig. 3, the question “Who along with Russia supported post WW-II communist movements”, the text pieces “supported”, “post”, and “communist movements” are repeating the input passage, while “Russia” and “WW-II” are synonymous replacements of input phrases “The Soviet Union” and “World War II”. Therefore, the copied words in questions should not be restricted to out-of-vocabulary words. Although this phenomenon is well-known by existing approaches, they do not properly and explicitly distinguish whether a word is from copy or from generate.\n\nIn our model, we consider the non-stop words that are shared by both an input passage and the output question as clue words, and encourage the model to copy clue words from input. After labeling clue words, we train a GCN-based clue predictor to learn whether each word in source text can be copied to the target question. The predicted clue words are further fed into a Seq2Seq model with attention and copy mechanism to help with question generation. Besides, different from existing approaches that share a vocabulary between source passages and target questions, we reduce the size of the target vocabulary of questions to be smaller than source passages and only include words with word frequency higher than a threshold. The idea is that the low-frequency words in questions are usually copied from source text rather than generated from a vocabulary. By combining the above strategies, our model is able to learn when to generate or copy a word, as well as which words to copy or generate during the progress of question generation. We will describe our operations in more detail in the next section.\n\n3. Model Description\n\nFigure 4. Illustration of the overall architecture of our proposed model. It contains a GCN-based clue word predictor, a masked feature-rich encoder for input passages, and an attention-and-copy-based decoder for generating questions.\n\nIn this section, we introduce our proposed framework in detail. Similar to (Zhou et al., 2017; Serban et al., 2016; Du et al., 2017), our question generator is based on an encoder-decoder framework, with attention and copying mechanisms incorporated. Fig. 4 illustrates the overall architecture and detailed components in our model. Our model consists of three components: the clue word predictor, passage encoder and question decoder.\n\nThe clue word predictor predicts potential clue words that may appear a target question, based on the specific context of the input passage (without knowing the target question). It utilizes a syntactic dependency tree to reveal the relationship of answer tokens relative to other tokens in a sentence. Based on the tree representation of the input passage, we predict the distribution of clue words by a GCN-based encoder applied on the tree and a Straight-Through (ST) Gumbel-Softmax estimator\n\n(Jang et al., 2016) for clue word sampling. The outputs of the clue word predictor are fed to the passage encoder to advise the encoder about what words may potentially be copied to the target question.\n\nThe passage encoder incorporates both the predicted clue word distribution and a variety of other feature embeddings of the input words, such as lexical features, answer position indicators, etc. Combined with a proposed low-frequency masking strategy (a shortlist strategy to reduce complexity on tuning input word embeddings), our encoder learns to better capture the useful input information with fewer trainable parameters.\n\nFinally, the decoder jointly learns the probabilities of generating a word from vocabulary and copying a word from the input passage. At the decoder side, we introduce a multitask learning strategy to intentionally encourage the copying behavior in question generation. This is achieved by explicitly labeling the copy gate with a binary variable when a (non-stop) word in the question also appears in the input passage in the training set. Other multi-task labels are also incorporated to accurately learn when and what to copy. We further shortlist the target vocabulary based on the frequency distribution of non-overlap words. These strategies, assisted by the encoded features, help our model to clearly learn which word in the passage is indeed a clue word to be copied into the target question, while generating other non-clue words accurately.\n\nThe entire model is trained end-to-end via multitask learning, i.e., by minimizing a weighted sum of losses associated with different labels. In the following, we first introduce the encoder and decoder, followed by a description of the clue word predictor.\n\n3.1. The Passage Encoder with Masks\n\nOur encoder is based on bidirectional Gated Recurrent Unit (BiGRU)\n\n(Chung et al., 2014), taking word embeddings, answer position indicators, lexical and frequency features of words, as well as the output of the clue word predictor as the input. Specifically, for each word in input passage , we concatenate the following features to form a concatenated representation to be input into the encoder:\n\n • Word Vector. We initialize each word vector by Glove embedding (Pennington et al., 2014). If a word is not covered by Glove, we initialize its word vector randomly.\n\n • Lexical Features\n\n . We perform Named Entity Recognition (NER), Part-of-Speech (POS) tagging and Dependency Parsing (DEP) on input passages using spaCy\n\n (Matthew Honnibal, 2015), and concatenate the lexical feature embedding vectors.\n\n • Binary Features. We check whether each word is lowercase or not, whether it is a digit or like a number (such as word “three”), and embed these features by vectors.\n\n • Answer Position. Similar to (Zhou et al., 2017), we utilize the B/I/O tagging scheme to label the position of a given answer, where a word at the beginning of an answer is marked with B, I denotes the continuation of the answer, while words not contained in an answer are marked with O.\n\n • Word Frequency Feature. We derive the word vocabulary from passages and questions in the training dataset. We then rank all the words in a descending order in terms of word frequencies, such that the first word is the most frequent word. The top words are labeled as frequent words. Words ranked between and are labeled as intermediate words. The remaining with rank lower than are labeled as rare words, where and are two predefined thresholds. In this way, each word will be assigned a frequency tag L (low frequency), H (highly frequent) or M (medium frequency).\n\n • Clue Indicator Feature. In our model, the clue predictor (which we will introduce in more detail in Sec. 3.3) assigns a binary value to each word to indicate whether it is a potential clue word or not.\n\nDenote an input passage by . The BiGRU encoder reads the input sequence and produces a sequence of hidden states to represent the passage . Each hidden state is a concatenation of a forward representation and a backward representation:\n\n\nwhere and are the forward and backward hidden states of the -th token in , respectively.\n\nFurthermore, rather than learning the full representation for every word in the vocabulary, we use a masking strategy to replace the word embeddings of low-frequency words with a special ¡l¿ token, such that the information of low-frequency words is only represented by its answer/clue indicators and other augmented feature embeddings, except the word vectors. This strategy can improve performance due to two reasons. First, the augmented tagging features of a low-frequency word tend to be more influential than the word meaning in question generation. For example, given a sentence “¡PERSON¿ likes playing football.”, a question that can be generated is “What does ¡PERSON¿ like to play?”—what the token “¡PERSON¿” exactly is does not matter. This way, the masking strategy helps the model to omit the fine details that are not necessary for question generation. Second, the number of parameters that need be learned, especially the number of word embeddings that need be tuned, is largely reduced. Therefore, masking out unnecessary word embeddings while only keeping the corresponding augmented features and indicators does not hurt the performance of question generation. It actually improves training by reducing the model complexity.\n\n(a) Rank Distribution of All Question Words\n(b) Rank Distribution of Generated Question Words\n(c) Rank Distribution of Copied Question Words\nFigure 5. Comparing the rank distributions of all question words, words from generation, and words from copy.\n\n3.2. The Question Decoder with Aggressive Copying\n\nIn the decoding stage, we utilize another GRU with copying mechanism to generate question words sequentially based on the encoded input passage representation and previously decoded words. We first initialize the hidden state of the decoder GRU by passing the last backward encoder hidden state to a linear layer:\n\n\nFor each decoding time step , the GRU reads the embedding of the previous word , previous attentional context vector , and its previous hidden state to calculate its current hidden state:\n\n\nThe context vector for time step is generated through the concatenated attention mechanism (Luong et al., 2015). Attention mechanism calculates a semantic match between encoder hidden states and the decoder hidden state. The attention weights indicate how the model spreads out the amount it cares about different encoder hidden states during decoding. At time step , the attention weights and the context vector are calculated as:\n\n\nCombining the previous word embedding , the current decoder state and the current context vector , we can calculate a readout state by an MLP maxout layer with dropouts (Goodfellow et al., 2013)\n\n. Then the readout state is passed to a linear layer and a softmax layer to predict the probabilities of the next word over the decoder vocabulary:\n\n\nwhere is a -D vector.\n\nThe above module generates question words from a given vocabulary. Another important method to generate words is copying from source text. Copy or point mechanism (Gulcehre et al., 2016) was introduced into sequence-to-sequence models to allow the copying of unknown words from the input text, which solves the out-of-vocabulary (OOV) problem. When decoding at time step , the probability of copying is given by:\n\n\n\nis the Sigmoid function, and\n\nis the probability of copying. For the copy probability of each input word, we reuse the attention weights given by Equation (8).\n\nCopying mechanism has also been used in question generation (Zhou et al., 2017; Song et al., 2018; Hu et al., 2018), however, mainly to solve the OOV issue. Here we leverage the copying mechanism to enable the copying of potential clue words, instead of being limited to OOV words, from input. Different from existing methods, we take a more aggressive approach to train the copying mechanism via multitask learning based on different labels. That is, when preparing the training dataset, we explicitly label a word in a target question as a word copied from the source passage text if it satisfies all the following criteria:\n\n\ni) it appears in both source text and target question;\n\n\nii) it is not a stop word;\n\n\niii) its frequency rank in the vocabulary is lower than a threshold .\n\nThe remaining words in the question are considered as being generated from the vocabulary. Such a binary label (copy or not copy), together with which input word the question word is copied from, as well as the target question, are fed into different parts of the decoder as labels for multi-task model training. This is to intentionally encourage the copying of potential clue words into the target question rather than generating them from a vocabulary.\n\nThe intuition behind such an aggressive copying mechanism can be understood by checking the frequency distributions of both generated words and copied words (as defined above) in the training dataset of SQuAD. Fig. 5 shows the frequency distributions of all question words, and then of generated question words and copied question words. The mean and median rank of generated words are 2389 and 1032, respectively. While for copied words, they are 3119 and 1442. Comparing Fig. 5(b) with Fig. 5(c), we can see that question words generated from the vocabulary tends to be clustered toward high ranked (or frequent) words. On the other hand, the fraction of low ranked (or infrequent) words in copied words are much greater than that in generated words. This means the generated words are mostly from frequent words, while the majority of low-frequency words in the long tail are copied from the input, rather than generated.\n\nThis phenomenon matches our intuition: when people ask a question about a given passage, the generated words tend to be commonly used words, while the repeated text chunks from source passage may contain relatively rare words such as names and dates. Based on this observation, we further propose to reduce the vocabulary at the decoder for target question generation to be top frequently generated words, where is a predefined threshold that varies according to datasets.\n\n3.3. A GCN-Based Clue Word Predictor\n\nGiven a passage and some answer positions, our clue word predictor aims to identify the clue words in the passage that can help to ask a question and are also potential candidates for copying, by understanding the semantic context of the input passage. Again, in the training dataset, the non-stop words that are shared by both an input passage and an output question are aggressively labeled as clue words.\n\nWe note that clue words are, in fact, more closely connected to the answer chunk in the form of syntactic dependency trees than in word sequences. Fig. 6 shows our observation on the SQuAD dataset. For each training example, we get the nonstop words that appear in both the input passage and the output question. For each clue word in the training set, we find its shortest undirected path to the answer chunk based on the dependency parsing tree of the passage. For each jump on the shortest path, we record the dependency type. We also calculate the distance between each clue word and the answer in terms of the number of words between them. As shown in Fig. 6(a), prep, pobj, and nsubj appear frequently on these shortest paths. Comparing Fig. 6(b) with Fig. 6(c), we can see that the distances in terms of dependency trees are much smaller than those in terms of sequential word orders. The average and median distances on the dependency trees are and , while those values are and for sequential word distances.\n\nIn order to predict the positions of clue words based on their dependencies on the answer chunk (without knowing the question which is yet to be generated), we use a Graph Convolutional Network (GCN) to convolve over the word features on the dependency tree of each passage, as shown in Fig. 4. The predictor consists of four layers:\n\nEmbedding layer. This layer shares the same features with the passage encoder, except that it does not include the clue indicators. Therefore, each word is represented by its word embedding, lexical features, binary features, the word frequency feature, and an answer position indicator.\n\nSyntactic dependency parsing layer. We obtain the syntactic dependency parsing tree of each passage by spaCy (Matthew Honnibal, 2015), where the dependency edges between words are directed. In our model, we use the syntactic structure to represent the structure of passage words.\n\nEncoding layer. The objective of the encoding layer is to encode the context information into each word based on the dependency tree. We utilize a multi-layered GCN to incorporate the information of neighboring word features into each vertex, which is a word. After GCN layers, the hidden vector representation of each word will incorporate the information of its neighboring words that are no more than hops away in the dependency tree.\n\nOutput layer. After obtaining the context-aware representation of each word in the passage, we calculate the probability of each word being a clue word. A linear layer is utilized to calculate the unnormalized probabilities. We subsequently sample the binary clue indicator for each word through a Gumbel-Softmax layer, given the unnormalized probabilities. A sampled value of indicates that the word is predicated as a clue word.\n\n(a) Distribution of Syntactic Dependency Types between Copied Words and the Answer\n(b) Distribution of Syntactic Dependency Distances between Copied Words and theAnswer\n(c) Distribution of Sequential Word Distances between Copied Words and the Answer\nFigure 6. Comparing the distributions of syntactic dependency distances and sequential word distances between copied words and the answer in each training sample.\n\n3.3.1. GCN Operations on Dependency Trees\n\nWe now introduce the operations performed in each GCN layer (Kipf and Welling, 2016; Zhang et al., 2018b). GCNs generalize the CNN from low-dimensional regular grids to high-dimensional irregular graph domains. In general, the input to a GCN is a graph with vertices , and edges . The edges can be weighted with weights , or unweighted. The input also contains a vertex feature matrix denoted by , where is the feature vector of vertex .\n\nSince a dependency tree is also a graph, we can perform the graph convolution operations on dependency trees by representing each tree into its corresponding adjacency matrix form. Now let us briefly introduce the GCN propagation layers used in our model (Zhang et al., 2018b). The weighted adjacency matrix of the graph is denoted as where . For unweighted graphs, the weights are either 1 or 0. In an -layer GCN, let denotes the input vector and denotes the output vector of node at the -th layer. We will utilize a multi-layer GCN with the following layer-wise propagation rule (Zhang et al., 2018b):\n\n\n\nis a nonlinear function (e.g., ReLU), and\n\nis a linear transformation.\n\nwhere is an identity matrix. is the degree of node (or word in our case) in the graph (or dependency tree).\n\nIn our experiments, we treat the dependency trees as undirected, i.e., . Besides, as we already included the dependency type information in the embedding vectors of each word, we do not need to incorporate the edge type information in the adjacency matrix.\n\nStacking this operation by layers gives us a deep GCN network. The input to the nodes in the first layer of the GCN are the feature vectors of words in the passage. After layers of transformations, we can obtain a context-aware representation of each word. We then feed them into a linear layer to get the unnormalized probability of each word being a clue word. After that, the unnormalized probabilities are fed to a Straight-Through (ST) Gumbel-Softmax estimator to sample an -dimensional binary vector indicating whether each of the words is a clue word or not.\n\n3.3.2. Gumbel-Softmax\n\nGumbel-Softmax (Jang et al., 2016)\n\nis a method of sampling discrete random variables in neural networks. It approximates one-hot vectors sampled from a categorical distribution by making them continuous, therefore the gradients of model parameters can be calculated using the reparameterization trick and the standard backpropagation. Gumbel-Softmax distribution is motivated by Gumbel-Max trick\n\n(Maddison et al., 2014), an algorithm for sampling from a categorical distribution. Let denotes a -dimensional categorical distribution where the probability of class is defined as:\n\n\nwhere is the unnormalized log probability of class . We can easily draw a one-hot sample from the distribution by the following equations:\n\n\nwhere is Gumbel noise used to perturb each . In this way, taking is equivalent to drawing a sample using probabilities .\n\nGumbel-Softmax distribution replaces the function by differentiable softmax function. Therefore, a sample drawn from Gumbel-Softmax distribution is given by:\n\n\nwhere is a temperature parameter. The Gumbel-Softmax distribution resembles the one-hot sample when diminishes to zero.\n\nStraight-Through (ST) Gumbel-Softmax estimator (Jang et al., 2016) is a discrete version of the continuous Gumbel-Softmax estimator. It takes different paths in the forward and backward propagation. In the forward pass, it discretizes a continuous probability vector sampled from the Gumbel-Softmax distribution into a one-hot vector by:\n\n\nIn the backward pass, it uses the continuous , so that the error signal can still backpropagate.\n\nUsing the ST Gumbel-Softmax estimator, our model is able to sample a binary clue indicator vector for an input passage. Then the clue indicator vector is fed into the passage encoder for question generations, as shown in Fig. 4.\n\n4. Evaluation\n\nIn this section, we evaluate the performance of our proposed models on the SQuAD dataset and the NewsQA dataset, and compare them with state-of-the-art question generation models.\n\n4.1. Datasets, Metrics and Baselines\n\nDataset Train Dev Test P-Length Q-Length A-Length\n • P-Length: average number of tokens of passages.\n Q-Length: average number of tokens of questions.\n A-Length: average number of tokens of answers.\n\nTable 1. Description of evaluation datasets.\n\nThe SQuAD dataset is a reading comprehension dataset, consisting of questions posed by crowd-workers on a set of Wikipedia articles, where the answer to every question is a segment of text from the corresponding reading passage. SQuAD 1.1 is used in our experiment containing 536 Wikipedia articles and more than 100K question-answer pairs. When processing a sample from dataset, instead of using the entire document, we take the sentence that contains the answer as the input. Since the test set is not publicly available, we use the data split proposed by (Zhou et al., 2017) where the original dev set is randomly split into a dev test and a test set of equal size.\n\nIn the NewsQA dataset, there are 120K questions and their corresponding answers as well as the documents that are CNN news articles. Questions are written by questioners in natural language with only the headlines and highlights of the articles available to them. With the information of the questions and the full articles, answerers select related sub-spans from the passages of the source text and mark them as answers. Multiple answers may be provided to a same question by different answerers and they are ranked by validators based on the quality of the answers. In our experiment, we picked a subset of NewsQA where answers are top-ranked and are composed of a contiguous sequence of words within the input sentence of the document.\n\nTable 1 shows the number of samples in each set and the average number of tokens of the input sentences, questions, and answers listed in columns P-Length, Q-Length, and A-Length respectively.\n\nWe report the evaluation results with following metrics.\n\n • BLEU (Papineni et al., 2002). BLEU measures precision by how much the words in prediction sentences appear in reference sentences at the corpus level. BLEU-1, BLEU-2, BLEU-3, and BLEU-4, use 1-gram to 4-gram for calculation, respectively.\n\n • ROUGE-L (Lin, 2004). ROUGE-L measures recall by how much the words in reference sentences appear in prediction sentences using Longest Common Subsequence (LCS) based statistics.\n\n • METEOR (Denkowski and Lavie, 2014)\n\n . METEOR is based on the harmonic mean of unigram precision and recall, with recall weighted higher than precision.\n\nIn the experiments, we have eight baseline models for comparison. Results reported on PCFG-Trans, MPQG, and NQG++ are from experiments we conducted using published code on GitHub. For other baseline models, we directly copy the reported performance given in their papers. We report all the results on the SQuAD dataset, and for the NewsQA dataset, we can only report the baselines with open source code available.\n\n • PCFG-Trans (Heilman, 2011)\n\n is a rule-based system that generates a question based on a given answer word span.\n\n • MPQG (Song et al., 2018) proposed a Seq2Seq model that matches the answer with the passage before generating the question.\n\n • SeqCopyNet (Zhou et al., 2018) proposed a method to improve the copying mechanism in Seq2Seq models by copying not only a single word but a sequence of words from the input sentence.\n\n • seq2seq+z+c+GAN (Yao et al., 2018) proposed a model employed in GAN framework using the latent variable to capture the diversity and learning disentangled representation using the observed variable.\n\n • NQG++ (Zhou et al., 2017) proposed a Seq2Seq model with a feature-rich encoder to encode answer position, POS and NER tag information.\n\n • Answer-focused Position-aware model (Sun et al., 2018) incorporates the answer embedding to help generate an interrogative word matching the answer type. And it models the relative distance between the context words and the answer for the model to be aware of the position of the context words when generating a question.\n\n • s2sa-at-mp-gsa (Zhao et al., 2018) proposed a model which contains a gated attention encoder and a maxout pointer decoder to address the challenges of processing long text inputs. This model has a paragraph-level version and a sentence-level version. For the purpose of fair comparison, we report the results of the sentence-level model to match with our settings.\n\n • ASs2s (Kim et al., 2018) proposed an answer-separated Seq2Seq to identify which interrogative word should be used by replacing the target answer in the original passage with a special token.\n\nFor our models, we evaluate the following versions:\n\n • CGC-QG (no feature-rich embedding). We name our model as Clue Guided Copy for Question Generation (CGC-QG). In this variant, we only keep the embedding of words, answer position indicators, and clue indicators for each token, and remove the embedding vectors of other features.\n\n • CGC-QG (no target reduction). This model variant does not contain target vocabulary reduction operation.\n\n • CGC-QG (no clue prediction). The clue predictor and clue embedding are removed in model variant.\n\n • CGC-QG. This is the complete version of our proposed model.\n\n4.2. Experiment Settings\n\nWe implement our models in PyTorch 0.4.1\n\n(Paszke et al., 2017) and train the model with a single Tesla P40. We utilize spaCy (Matthew Honnibal, 2015) to perform dependency parsing and extract lexical features for tokens. As to the vocabulary, we collect it from the training dataset and keep the top 20K most frequent words for both datasets.\n\nWe set the threshold and . For target vocabulary reduction, we set . The embedding dimension of word vector is set to be and initialized by GloVe. The word vectors of words that are not contained in GloVe are initialized randomly. The word frequency features are embedded to 32-dimensional vectors, and other features and indicators are embedded to 16-dimensional vectors. All embedding vectors are trainable in the model. We use a single layer BiGRU with hidden size 512 for the encoder, and a single layer undirected GRU with hidden size 512 for the decoder. The dropout rate is applied to the encoder, decoder, and the attention module.\n\nDuring training, we optimize the Cross-Entropy loss function for clue prediction, question generation, and question copying, and perform gradient descent by the Adam\n\n(Kingma and Ba, 2014) optimizer with an initial learning rate , two momentum parameters are and respectively, and\n\n. The mini-batch size for each update is set to 32 and model is trained for up to 10 epochs (as we found that usually the models derive the best performance after\n\n\nepochs). We apply gradient clipping with range\n\nfor Adam. Besides, exponential moving average is applied on all trainable variables with a decay rate . When testing, beam search is conducted with beam width . The decoding process stops when a token ¡EOS¿ that represents end of sentence is generated.\n\n4.3. Main Results\n\nTable. 2 and Table. 3\n\ncompare the performance of our model with existing question generation models on SQuAD and NewsQA in terms of different evaluation metrics. For the SQuAD dataset, we compare our model with all the baseline methods we have listed. As to the NewsQA dataset, since only a part of the baseline methods made their code public, we compare our model with approaches that have open source code. We can see that our model achieves the best performance on both datasets and significantly outperforms state-of-the-art algorithms. On the SQuAD dataset, given an input sentence and an answer, the BLEU-4, ROUGE-L, and METEOR of our result are\n\n, , and respectively, while corresponding previous state-of-the-art results are , , and from different approaches. Similarly, our method also gives a significantly better performance on NewsQA compared with the baselines in Table 3.\n\nThe reason is that we combine different strategies in our model to make it learn when to generate or copy a word, and what to generate or copy. First, our model learns to predict clue words through a GCN-based clue predictor. Second, our encoder incorporates a variety of embeddings of different features and clue indicators. Combining with the masking strategy, our model can better discover the relationship between input patterns and output patterns. Third, the reduced target vocabulary also helps our model to better capture when to copy or generate, and the generator is easier to train with a reduced vocabulary size. And most importantly, our new criteria of marking a question word as copied word (as described in Sec.3.3) helps the model to make better decisions on which path to go, i.e., to copy or to generate, during question generation. By incorporating part of these new strategies and modules into our model, we can achieve performance better than state-of-the-art models on SQuAD and NewsQA. With all these designs implemented, our model gives the best performance on both datasets.\n\nThere is a significant gap between the performance on SQuAD and on NewsQA due to the different characteristics of the datasets. The average answer length of NewsQA is 44.2% larger than it of SQuAD according to the statistics shown in Table 1. Long answers usually hold more information and are more difficult to generate questions. Furthermore, reference questions in NewQA tend to have less strict grammars and more diverse phrasings. To give a typical example, “Iran criticizes who?” is a reference question in NewsQA which does not start with an interrogative word but ends with one. These characteristics make the performance on NewsQA not as good as on SQuAD. However, our approach is still significantly better than the compared approaches on NewsQA dataset. It demonstrates that copy from the input is a general phenomenon across different datasets. Our model better captures what copied words are and what generated words are in a question based on our new criteria of labeling a question word as copied word or not.\n\nAnswer-focused Position-aware model\nCGC-QG (no feature-rich embedding)\nCGC-QG (no target reduction)\nCGC-QG (no clue prediction)\n • Experiments are conducted on baselines followed by a “” using released source code. Results of other baselines are copied from their papers where unreported metrics are marked “”.\n\nTable 2. Evaluation results of different models on SQuAD dataset.\nCGC-QG (no feature-rich embedding)\nCGC-QG (no target reduction)\nCGC-QG (no clue prediction)\n\nTable 3. Evaluation results of different models on NewsQA dataset.\n\n4.4. Analysis\n\nWe evaluate the impact of different modules in our model by ablation tests. Table 2 and Table 3 list the performance of our model variants with different sub-components removed.\n\nWhen we remove the extra feature embeddings in our model, i.e., the embeddings of POS, NER, Dependency Types, word frequency levels (low-frequent, median-frequent, high-frequent), and binary features (whether it is lowercase, digit), the performance drops significantly. This is because the tags and feature embeddings represent each token in different aspects. The number of different tags is much smaller than the number of different words. Therefore, the patterns which can be learned from these tags and features are more obvious than what we can learn from word embeddings. Even though a well-trained word vector may contain the information of other features such as POS or NER, explicitly concatenating these feature embedding vectors helps the model to capture the patterns to ask a question more easily.\n\nRemoving the operation of target vocabulary reduction also hurts the performance of our model. As we discussed earlier, the non-overlap question words (or generated words) are mostly covered by the high frequency words. Reducing the target vocabulary size helps our model to better learn the probabilities of generating these words. On the other hand, it also encourages the model to better capture what they can copy from input text.\n\nFinally, without the clue prediction module, the performance also drops on both datasets. This is because when given an answer span in a passage, asking a question about it is still a one-to-many mapping problem. Our clue prediction module learns how people select the related clue words to further reduce the uncertainty of how to ask a question by learning from a large training dataset. With predicted clue indicators incorporated into the encoder of generator, our model can fit the way how people ask questions in the dataset.\n\n5. Related Work\n\nIn this section, we review related works on question generation and graph convolutional networks.\n\nExisting approaches for question generation can be mainly classified into two classes: heuristic rule-based approaches and neural network-based approaches. The rule-based approaches rely on well-designed rules or templates manually created by human to transform a piece of given text to questions\n\n(Heilman and Smith, 2010; Heilman, 2011; Chali and Hasan, 2015). However, they require creating rules and templates by experts which is extremely expensive. Also, rules and templates have a lack of diversity and are hard to generalize to different domains.\n\nCompared with rule-based approaches, neural network-based models are trained end-to-end and do not rely on hand-crafted rules or templates. Most of the neural question generation models consider the task as Seq2Seq and take advantage of the encoder-decoder framework with attention mechanism. (Serban et al., 2016) utilizes an encoder-decoder framework with attention mechanism to generate factoid questions from FreeBase. (Du et al., 2017) generates questions from SQuAD passages based on a sequence-to-sequence model with attention mechanism.\n\nHowever, given an input sentence, generating questions is a one-to-many mapping, as we can ask different questions from different aspects. Purely relying on Seq2Seq model may not be able to learn such a one-to-many mapping (Gao et al., 2018). To resolve this issue, recent works assume the aspect is known when generating a question (Zhou et al., 2017; Yuan et al., 2017; Subramanian et al., 2017; Kim et al., 2018; Song et al., 2018) or can be detected by a third-party pipeline (Du and Cardie, 2018). (Zhou et al., 2017) enriches the sequence-to-sequence model with answer position indicator to indicate if the current word is an answer word or not, and further incorporates copy mechanism to copy words from the context when generating a question. (Song et al., 2018; Hu et al., 2018) fuse the answer information into input sentence first, and apply a Seq2Seq model with attention and copy mechanism to generate answer-aware questions. (Gao et al., 2018) takes question difficulty into account by a difficulty estimator, and generate questions on different difficulty levels. (Sun et al., 2018) enriches the model with both answer embedding and the relative distance between the context words and the answer. (Tang et al., 2017; Tang et al., 2018) model question answering and question generation as dual tasks. They found that jointly training the two tasks helped to generate better questions.\n\nWe argue that even with an answer indicator, the problem of question generation is still a one-to-many mapping. To solve this problem, we enrich the model with a “clue word” predictor, where a clue word means a word that is related to the aspect of the targeting output question and usually copied to the question. We represent an input sentence by its syntactic dependency tree and represent each word using feature-rich embeddings, and let the model learn to predict whether each word in context can be a clue word or not. Combining the clue prediction module with a Seq2Seq model with attention and copy mechanism, our model learns when to generate a word from a target vocabulary and when to copy a word from the input context.\n\nGraph Convolutional Networks generalize Convolutional Neural Networks to graph-structured data, and have been developed and grown rapidly in scope and popularity in recent years (Kipf and Welling, 2016; Defferrard et al., 2016; Liu et al., 2018; Marcheggiani and Titov, 2017; Battaglia et al., 2018). Here we focus on the applications of GCNs on natural language. (Marcheggiani and Titov, 2017) applies GCNs over syntactic dependency trees as sentence encoders, and produces latent feature representations of words in a sentence for semantic role labeling. (Liu et al., 2018) matches long document pairs using graph structures, and classify the relationships of two documents by GCN. (Zhang et al., 2018b) proposes an extension of graph convolutional networks that is tailored for relation extraction. It pools information over dependency trees efficiently in parallel. In our paper, we apply GCN over the dependency tree of an input sentence, and predict the potential clue words in the sentence together with a Gumbel-Softmax estimator.\n\n6. Conclusion\n\nIn this paper, we demonstrate the effectiveness of teaching the model to make decisions during the question generation process on which words to generate and to copy. We label the nonstop and overlap words between input passages and questions as copy targets and use such labels to train our model. Besides, we further observe that the distribution of generated question words are mostly common words with relative high frequency. Based on this observation, we reduce the vocabulary size for generating question words. To help the model better capture how to ask a question and alleviate the issue of one-to-many mapping when asking a question, we propose a GCN-based clue prediction module to predict which part of words can be a clue word to ask a question given an answer. It utilizes the syntactic dependency tree representation of a passage to encode the information of each token in the passage, and sample a clue indicator for each token using a Straight-Through (ST) Gumbel-Softmax estimator. Our simulation results on the SQuAD dataset and NewsQA dataset show that our model outperforms a range of existing state-of-the-art approaches significantly.", "pred_label": "__label__1", "pred_score_pos": 0.9889971017837524} {"content": "5 Tutorial: From Models to Interpreters\n\nA core use case for algebraic is fast and cheap interpreter development. With the right tooling, throw-away interpreters can be an easy way to explore and validate language design choices quickly.\n\nAs it happens, Haskell is already pretty good at this. Algebraic data types and functional destructuring syntax make interpreters easy to read and write, and its type system keeps track of pervasive breaking changes for you. algebraic addresses the untyped half of this equation—algebraic data structures (ADTs sans typing constraints) with destructuring syntax.\n\nIn this series, we will implement three interpreters based on the models originally used to design algebraic itself:\n\n 1. A core model based on the untyped λ-calculus,\n\n 2. An extended syntax that compiles down to core constructs, and\n\n 3. A hosted variant that borrows additional constructs from the implementing platform.\n\nThe tutorials are written in an informal style with code and discussion mixed together. If you prefer source code, it can be read all in one place on github.\n\n    5.1 The Core Calculus\n\n    5.2 A Syntax Extension\n\n    5.3 Exposing the Host", "pred_label": "__label__1", "pred_score_pos": 0.7566349506378174} {"content": "Are Aliens Responsible For Mystery Monoliths Appearing Across The World?\n\nMahima Negi\n·6-min read\n\nLast month saw the occurrence of similar mysterious structures at random places like a desert on one side of the earth and then a hilltop located on the other side of the planet.\n\nThe structure is being identified as a Monolith— described as an obelisk, column, or a large statue composed of a single block of stone or a rock.\n\nThe first Monolith appeared in a desert, in the middle of nowhere, in Utah. It was discovered on November 18th, by state helicopter crews who were aiding wildlife biologists to count the bighorn sheep.\n\nSoon after its discovery, the monolith invited a lot of curious travelers towards it, even though its exact location was not revealed.\n\nThis mysterious monolith was a three-sided reflective structure, made of stainless steel, and was roughly around eleven feet tall. It caused a great buzz on the internet. Its unnatural presence generated a lot of attention from people, journalists, and experts all around the world.\n\nWhat happened next was even weirder, two weeks after its discovery it disappeared—leaving the world in awe.\n\nMonolith Makes A Comeback\n\nThe story didn’t end there, on 26th November, shortly after the disappearance of Utah’s monolith, another similar structure was found in Romania!\n\nShocked by the series of events, people soon started speculating. Questions like “Is it the same monolith?”, “How did it travel so quickly?” were prompted.\n\nThis new monolith appeared on top of a small hill near an ancient Dacian fortress, its structure was hastier than the one in Utah, indicating that it was a different structure altogether.\n\nAfter making a brief appearance, the strange piece of metal disappeared again, similarly to the one in Utah, adding even more confusion to the mystery.\n\n…And The Mystery Continues\n\nDays after the disappearance of monoliths from Utah and Romania, the presence of a new and third monolith was confirmed at Pine Mountains in Atascadero, California.\n\n“The three-sided obelisk appeared to be made of stainless steel, 10-feet tall and 18 inches wide. The object was welded together at each corner, with rivets attaching the side panels to a likely steel frame inside,” reported the Atascadero News\n\nThis monolith too is similar to the ones that were found in Utah and Romania—a three-sided reflective structure made of stainless steel but this one is not fixed to the ground and can be easily pushed and moved, unlike the others.\n\nA local hiker, Ray Johnson confirmed that the monolith was not there on Tuesday.\n\nAlso Read: Here’s Why Invisible Aliens May Exist Amongst Us And We’ll Never Know\n\nPranksters? Artists? Or Aliens?\n\nThe appearance and disappearance of monoliths in three places within the span of 15 days have invited a lot of speculation.\n\nNaturally, the internet is full of conspiracy theories, memes, and trolls.\n\nVarious possible explanations and theories like ‘ a work of art’, ‘alien invasion’, and ‘silly pranks’ were making rounds on social media.\n\nThe local mayor of the village in Romania where the monolith was found was also compelled to issue a statement urging “those who think there is still life in the universe” not to panic.\n\nPeople on the internet are convinced that aliens are behind this act, interesting theories like “aliens are trying to find the signal on earth” are being spread.\n\nThe object possesses a stark resemblance to the famous monolith from Stanley Kubrick’s 1968 film “2001: Space Odyssey”, signaling to some sci-fi fanatics that it might be an extraterrestrial device that affects humans.\n\nSome people are dead serious and scared while others are hoping on this extraterrestrial train just for a good laugh.\n\nA gallery owner suggested to the media that the appearance of the structure may be a tribute to the late artist John McCracken, who created similar-looking objects before he died in 2011, therefore it is also being theorized as a work of an artist.\n\nAnother possibility of it being an artwork comes from the history of the Land Art Movement that was active in the 1960s-70s, the movement inspired art made from earth and rejected commodification of the same.\n\nNew proof indicated human activity responsible for the disappearance of Utah’s monolith.\n\nNew data that surfaced on the internet this week show four men caught in a video, trying to remove the monolith found in Utah, one of them can be heard saying “leave no trace”, as reported in an article by The Guardian. Therefore, clearly, its removal had nothing to do with aliens.\n\nIt was photographer Ross Bernards who posted on his Instagram on Monday of ‘the object’s final moments’ that proved that there was nothing extraterrestrial about the technology as it appeared to be ‘sheets of metal riveted to a hollow wooden scaffold’.\n\nA report gives details.\n\n“Bernards drove six hours on Friday with three friends to take some pictures of the object by moonlight. After getting some shots, he said he heard some voices coming up the canyon, and four men appeared. Bernards wrote that he stepped away so the new group could also enjoy some time alone with the object, only to watch as they began shoving it.\n\n“They gave a couple of pushes on the monolith and one of them said, ‘You better have got your pictures,'” Bernards wrote. “He then gave it a big push, and it went over, leaning to one side. He yelled back to his other friends that they didn’t need the tools. The other guy with him at the monolith then said ‘this is why you don’t leave trash in the desert”.”\n\nThe different structures and details of monoliths also indicate that they were human-made and replicated.\n\nRealists believe that it’s most likely that people got bored with quarantine and tried to make 2020 more surreal than it already is.\n\nIt can also be a great prank to make people believe in alien activities but in any case, mischievous people were quick to follow and copy the original structure found in Utah and continue the prank by placing it in Romania.\n\nA new report from Germany informed the internet that a famous phallic-like wooden structure that has been a tourist attraction for 4-5 years now in south-west Munich, has gone missing or apparently ‘been chopped down’, which can be a prank inspired by the series of monolith disappearances.\n\nWhere Next?\n\nThe mystery of Monolith remains unsolved and the internet is still buzzing about its latest appearance.\n\nPrank or not, the question that has left everybody waiting in excitement is “when and where will it appear next?”\n\nImage Credits: Google Images\n\nSources: Indian Express, The Guardian, India Today\n\nFind The Blogger: @MNtweeting\n\nThis post is tagged under: Mystery, mysterious, monoliths, mysterious monolith, conspiracy theories, monolith theories, alien activity, alien invasion, alien technology, prank, hoax, work of art, art, artists, photographer, Utah, desert, Romania, California, Internet, Germany, Phallic structure, unsolved\n\nOther Recommendations:", "pred_label": "__label__1", "pred_score_pos": 0.508652925491333} {"content": "Get a Free Horoscope\n\nSignificance Of The Lagna And The Lagna Lord In Vedic Astrology\n\nThe Lagna And The Lagna Lord\n\nThe rising sign or Lagna is the degree of the Rashi and Nakshatra that is rising on the eastern horizon at the time of the native’s birth. The significance of Lagna is the focal point of the Vedic horoscope. We calculate the houses from the Lagna Rashi. The house that the Lagna occupies is the first house. We calculate the Lagna is based on the date and time of birth. The place of birth is vital as a change of longitude will change the Lagna.\n\nThe Lagna does a full cycle of all the 12 Rashis in a day which means that the Lagna is in each Rashi for only two hours. While the Moon sign or Chandra Rashi tells us about the mind of a native the Lagna Rashi and Nakshatra tell us about the ideals, intelligence, appearance and the person himself/herself. It shows how other people will view the native. Lagna also tells us about the vitality, character, longevity, power and dignity of the person. It also signifies the head and face areas and tells us about this area of the person’s body.\n\nLagna Chart North Indian Style\nLagna Chart North Indian Style\n\nStrength Of The Lagna Lord\n\nThe Lord of the Rashi in which the Lagna is placed is called the Lagna lord or the Lagnesha. The strength and house position of the Lagna Lord in Vedic astrology is one of the key points in a person’s horoscope. The placement of the Lagnesha tells where the person’s focus will be. \n\n\nThe Lagna in the very early or very late degrees of the Rashi makes it weak. Some astrologers consider this to be at lower than 3 degrees and 20 minutes or above 26 degrees and 40 minutes. When the Lagna is weak the mental and physical strength of the person suffers. This can be mitigated if there are other factors that strengthen the Lagna. The aspect of benefics and malefics upon the significance of Lagna influence it greatly. \n\n\nThe text Sarvartha Chintamani states that if a house contains or is aspected by its own lord and benefics while no malefic aspect it gets strengthened. If its lord is placed in the 5th, 9th, 2nd, 4th, 7th or 10th house without the influence of malefic planets, it gets strengthened and yields good results of that house. The text also states that if the Lagnesha is very strong, without the aspect of any malefic on it and is placed in a Kendra with the aspect of benefic planets, it confers long life, virtues and wealth to the person. The Lagnesha casting an aspect on the Lagna is always desirable regardless of whether the Lagnesha is benefic or malefic.\n\nThe book also states that if the Lagnesha is not eclipsed the person becomes famous. If the Lagnesha is well placed the person is prosperous and happy. On the other hand, if the Lagnesha is placed in a Dusthana (6,8 or 12) house, in the house of a malefic, in debilitation or in an enemy sign the person will lead an unhappy miserable life and in a despicable place amidst outcast or vile people. If the Lagnesha lacks strength he will suffer constantly facing many calamities and remain sad and sick.\n\nThe significance of Lagna and the Lagnesha tell us how that person will fare in the world and how they will be viewed and treated by people in general. A strong Lagna and Lagnesha indicate a healthy, wealthy and successful life.\n\nLagna Chart South Indian Style\nLagna Chart South Indian Style\n\nAspects On Lagna\n\nWhen the planet that is aspecting the Lagna is benefic to the significance of Lagna, the results are good and when it is malefic the opposite is true.  If there is more than one planet aspecting the result will be a combination judged by the astrologer. \n\nSun: When the Sun aspects the Lagna the person will be valorous and hot-tempered. He or she will gain wealth from their parents and serve the King (government in modern times).\n\nMoon: When the Moon aspects the Lagna the person will be fortunate, courteous, sympathetic, wealthy. \n\nMars: The aspect of Mars makes the person hot-tempered, adventurous, injury-prone, righteous and earn from bravery. \n\nMercury: Mercury’s aspect on the Lagna makes the person learned, intelligent and helps him/her earn by their intelligence. The person is famous and honourable.\n\nJupiter: When Jupiter aspects the Lagna it makes the person learned, religious, famous, helps him/her keep the company of virtuous people, and honoured by the King (government).\n\nVenus: The aspect of Venus makes the person look youthful, good looking, wealthy and favoured by women.\n\nSaturn: When Saturn aspects the Lagna the native is troubled by heavy odds and sickness. The person works hard but earns less. The person is dirty, unhappy, foolish and attached to elderly women.\n\nSignifications Of Lagna Lord Or Lagnesha Placement\n\nLagna Lord In The First House\n\nThe significance of Lagna in the first house or the Lagna itself is that the native will have high energy, vitality, good health and strong ideals. The Lagnesha in Lagna which is the house of intelligence makes them very intelligent. They hold firm to their principles and ideals. Lagna also represents the body of the person and hence the Lagnesha in Lagna Vedic astrology shows that the person will invest time, effort and money in beautifying and keeping their body fit.\n\nStrength Vs Weakness\nStrength Vs Weakness\n\nLagna Lord In The Second House\n\nThe  Lagnesha in the second house makes the person gainful scholarly, good-natured, happy, religious and honourable. Since the Lagnesha which the intelligence and ideals of the person are focussed on the second house which is the house of family, food and wealth the person will have a lot of interest and focus on these aspects of life. The second house is also the house of speech and resident of the Goddess Saraswati thus making the person scholarly and wise. The commitment to the family can also be extended to the whole community making the person honoured in society. \n\nLagna Lord In The Third House\n\nWhen the Lagnesh is in the third house the person is very courageous, has all kinds of material luxury, is honourable, intelligent and happy. The third house is the house of courage, younger siblings, sexual morals, valour and communication. So naturally, the Lagnesh being here would make the person very courageous. In practical application, this makes the person a risk-taker and natural leader. \n\nLagna Lord In The Fourth House\n\nWhen the Lagnesh is in the fourth house there will be a great attachment to the family especially the mother and interest in wealth, vehicles, property, education and spirituality. This makes a person receive a good education and be popular in society. This placement also forms a Raj Yoga and brings fulfilment of material desires. \n\nLagna Lord In The Fifth House\n\nThe fifth house is one of the trines that is related to religion and it is very auspicious to have the Lagnesh in the fifth house. Significance of Lagna in fifth house shows an inclination toward religious matters. The person will be intelligent, famous and liked by the government. This position affects the health of the native in childhood but strengthens the father’s position in life. Since the fifth house is related to education this position shows that the person will have educational accomplishments. \n\nLagna Lord In The Sixth House\n\nThe sixth house is the house of disease, enemies and competition. This position indicates childhood illnesses. If the Lagnesh is strong in this house it indicates a career related to disease and enemies which would be healthcare or the army. There is success in competitive activities such as sports and competitive exams. \n\nLagna Lord In The Seventh House\n\nThe placement of the Lagnesh in the seventh house makes the person an extrovert, god at business and very interested in relationships/partnerships especially marriage related matters. \n\nSignificance Of Lagna On Man's Life\nSignificance Of Lagna On Man’s Life\n\nLagna Lord In The Eighth House\n\nThe Lagnesh in the eighth house indicates a person who is a psychic, mystic, a good advisor and very interested in the occult. The person is miserly and tends to get involved in unethical relationships.\n\nLagna Lord In The Ninth House\n\nThe ninth house is a trine house and the Lagnesh in this house is a good placement. It makes the person a good orator, interested in travel, religious, fortunate, wealthy, with higher education and having good children. The person would also receive good fortune from their father. \n\nLagna Lord In The Tenth House\n\nThe Lagnesh in the tenth house makes a person very career-oriented resulting in professional success. The person is greatly influenced by the father. \n\nLagna Lord In The Eleventh House\n\nThe Lagnesh in the eleventh house makes a person-oriented towards profit-making and gain and also gives good results of the same. The person would have a large network circle of friends and also be very inclined towards their elder siblings. \n\nLagna Lord In The Twelfth House\n\nThe twelfth house placement of the Lagnesh gives an unhappy and lonely childhood probably far away from the place of birth. They will have much wasteful expenditure and be interested in lonely places, hospitals etc. The person would also show interest in matters related to travel, sex and lonely places.", "pred_label": "__label__1", "pred_score_pos": 0.715922474861145} {"content": "what is a project programme\n\nMonitoring is checking progress against plans. A program manager manages multiple projects, and sometimes multiple programs while a project manager manages the teams responsible for fulfilling the project and achieving its deliverables.. Generally speaking, a program manager has broader … Project management is the planning, organizing and managing the effort to accomplish a successful project. Professionals who carry this misconception into the PMP® certification exam are the least likely ones to pass the exam. Monitoring allows results, processes and experiences to be documented and used as a basis to steer decision-making and learning processes. All deliver complex programmes and … Of course, many of the office buildings that are built are similar in many respects but each individual facility is unique in its own way. According to the PMBOK (Project Management Body of Knowledge) 3rd edition, A project is defined as a “temporary endeavor with a beginning and an end and it must be used to create a unique product, service or result”. This definition lets make a distinction between other pieces of work, such as: 1. One view of project planning divides the activity into: A Project management plan is a formal, approved document that defines how the project is executed, monitored, and controlled. Program Framework is a Microsoft Gold Partner delivering Project, Programme and Portfolio Management solutions with Microsoft Cloud. Project for the web, formerly known as Project service, is Microsoft's most recent offering for cloud-based work and project management. Later, when you perform the Plan Scope, Estimate Costs, and Develop Schedule processes, you can revise the components of the project plan with more detail to reflect a deeper understanding of the project. Stream to Twitch, YouTube and many other providers or record your own videos with high quality H264 / AAC encoding. Privacy Policy, Similar Articles Under - Project Management, Bidding as an Essential Skill for Project Managers, Time/Material Billing & Fixed Cost Billing, Why Project Managers Should Not Overpromise and Underestimate at the Same Time, The Need for Person Independence in Software Project Management, The Importance of Ethics in Project Management, Why Most Projects Run into Problems and How to Avoid them and What to do about it, Why Project Managers Must Master the Art of Dealing with Disruptions, Why Project Managers Must Focus on Last Mile Connectivity to Ensure Success, How Project Managers Can Benefit from Knowledge Management Systems, Why Project Managers Must be Prepared to Deal with Disruptions of All Kinds, Transitioning to Agile? Any change to the scope of the project must have a matching change in budget, time, resources, or all three. Because major defense programs entail working with contractors, it is often called acquisition … Take Simplilearn’s PMP Certification course to get all the training you need. As you will see in this article, a Project Management Plan is a document that defines how a project is executed, monitored, and controlled; it is much more than a schedule chart. A project proposal is a document that provides all the information required for project stakeholders to decide to initiate a project. This is in contrast to a program, (referred to a 'programme' in the UK) which is 1) an ongoing process, such as a quality control program, or 2) an activity to manage a number of multiple projects together. A project is a one-time activity that produces a specific output and or outcome, for example, a building or a major new computer system. Increasing his professional Seniority: Programme Development Officer, manages more development projects at once. This position requires great responsibility and proper time management because the job entails constant monitoring and control of all project variables. A program will rely more on a rolling plan, as multi-year programs will need to adjust their plans as the business changes. Entry requirements. Program management or programme management is the process of managing several related projects, often with the intention of improving an organization's performance. The project scope is the definition of what the project is supposed to accomplish and the budgets of time and money that have been created to achieve these objectives. Management Study Guide is a complete tutorial for management students, where students can learn the basics as well as advanced concepts related to management and its related subjects. Besides proper planning, a project manager’s abilities also lie in efficiently controlling the project and ensuring project deliverables are on time—and that the project is completed per the project management plan. The scope baseline, schedule baseline, and the cost baseline are collectively referred to as the performance measurement baseline. For the purpose of definition, the phases may be divided into initial charter, scope statement, plan, baseline, progress, acceptance, approval and handover. Subscribe to our YouTube Channel & Be a Part of 400k+ Happy Learners Community. For instance, if your project is less than three months old and has fewer than 20 people working on it, you may not be working in what is called a project according to the definition of the term. Program – a broad, long-term objective that is often decomposed into a series of projects and sub-projects 2. Project management includes developing a project plan, which inv… The Essential Certificate is designed for people who are new to project and programme support office roles. The Project-Based Section 8 Rental Assistance program provides affordable apartment communities that are owned by private landlords with a rental subsidy that helps pay the rent for low income tenants. Each milestone at each stage is then elaborated and tracked for completion. This classification is according to the PMBOK. What this definition of a project means is that projects are those activities that cannot go on indefinitely and must have a defined purpose. A project administrator is a professional who organizes the necessary team members and specializes in facilitating, reporting and analyzing projects under the supervision of a project manager. Related: How Program Managers Use Software to Manage Project Portfolios The Difference Between a Program Manager and a Project Manager. The Project management plan is not created all at once. It is progressively elaborated, which means it is developed, refined, revisited, and updated. A project is an activity to meet the creation of a unique product or service and thus activities that are undertaken to accomplish routine activities cannot be considered projects. A project management plan is a collection of baselines and subsidiary plans that include: As per the PMBOK® Guide, the project management plan is an output of the Develop Project Management Plan process in the Project Integration Management Knowledge Area. Who grants the approval for the project management plan depends on the organizational structure and a number of other factors. It is essentially a rigorously defined project pitch … As the work proceeds, the performance of the project is measured against the performance measurement baseline included in the project management plan. The project may be finite but not the result. For instance, a project to build a monument would be of fixed duration whereas the result that is the monument may be for an indefinite period in time. Project for the web provides simple, powerful work management capabilities and can be used by project managers and team members to plan and manage work of … Finally, a project must be progressively elaborated. Most of the components of the project management plan are created in various processes defined in the PMBOK® Guide; for instance, the Communications Management Plan is developed in the Plan communications process. The project manager handles conflicting priorities in advance. The P3O ® guidance - which is aligned to PRINCE2 ®, MSP ®, and M_o_R ® - brings together a set of principles, processes and techniques to facilitate effective portfolio, programme and project management through enablement, challenge and support structures.. © Management Study Guide Typically the project plan is approved by the project manager, project sponsor, or the functional managers who provide the resources for the project. Documentation includes all actions required to define, prepare, integrate and coordinate additional plans. The phases of a project make up the project life cycle. Further, it is progressively elaborated. Project managers spend a substantial amount of time ensuring baselines are achieved, ensuring the project sponsor and the organization get the full benefits of their projects. In practice and in its aims, program management is often closely related to systems engineering, industrial engineering, change management, and business transformation. This means that a project is first defined initially and then as the project progresses, the definition is revisited and more clarity is added to the scope of the project as well as the underlying assumptions about the project. The customer signs the contract but often leaves the internal workings of the organization delivering the project. Typically the project plan is approved by the project manager, project sponsor, or the functional managers who provide the resources for the project. A pilot program, also called a feasibility study or experimental trial, is a small-scale, short-term experiment that helps an organization learn how a large-scale project might work in practice. Project is used in a variety of industries including construction, manufacturing, pharmaceuticals, government, retail, financial services and health care. Task – an identifiable and measurable activity that create a small unit of work for a related project 3. The Project manager creates the project management plan following inputs from the project team and the key stakeholders. Work package – division of a project task 4. It becomes less difficult for a project manager to get the project management plan approved, if: All the stakeholders are identified along with and their requirements and objectives. Thus, the naming of the phases of a project depends on the kind of deliverables that is sought at each phase. On the other hand, programs are definitely longer. Since you already have these things at the time you begin developing the project plan, you can go ahead and develop the scope management plan, cost management plan, and the schedule management plan. The build phase in a project delivers the completed code whereas the test phase is about the completed testing for the deliverables. A solid understanding of the project plan can pay rich dividends throughout your preparation for the PMP® certification exam, and also help in managing projects. A project is an activity to create something unique. An Introduction to Project Management: A Beginner’s Guide, Difference between Project Management Plan and Project Documents, What is Project Planning: Tools and Fundamentals, Project Management Tools for Effective Project Planning, preparation for the PMP® certification exam, Big Data Hadoop Certification Training Course, AWS Solutions Architect Certification Training Course, Certified ScrumMaster (CSM) Certification Training, ITIL 4 Foundation Certification Training Course, Data Analytics Certification Training Course, Cloud Architect Certification Training Course, DevOps Engineer Certification Training Course, Management plans for scope, schedule, cost, quality, human resources, communications, risk, and procurement. For instance, in a software project, the requirement phase needs to generate the requirement documents, the design phase the design document etc. However, the Schedule Management Plan, Cost Management Plan, and Scope Management Plan are created in the Develop Project Management Plan process. A project is an activity to meet the creation of a unique product or service and thus activities that are undertaken to accomplish routine activities cannot be considered projects. Every effort has a planning phase. Suitable for people with a basic working knowledge of IT. In organizations, a project is defined as a piece of work that is planned for implementation within current business environment. Each phase of the project is associated with a certain milestone and the set of deliverables that each phase is expected to deliver is then tracked for compliance and closure. Candidates should have basic working knowledge of IT. The program (or project) evaluation and review technique (PERT) is a statistical tool used in project management, which was designed to analyze and represent the tasks involved in completing a given project.. First developed by the United States Navy in 1958, it is commonly used in conjunction with the critical path method (CPM) that was introduced in 1957. What Project Managers Must Know About This Hot Methodology, Overcoming the Challenges of Delivering Projects on Time and Without Cost Overruns. A project management office (PMO) is a group — internal or external to a company — that sets, maintains and ensures standards for project management across that organization. In the defense sector, it is the dominant approach to managing very large projects. Are you ready to learn how to best handle project schedules, costs, the scope of work, project constraints, market competition, stakeholders, and more? Project vs Program Management Planning. This means that the project progresses in steps and continues by increments. PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc. It is convenient for the project managers to divide the project into phases for control and tracking purposes. If these adjustments fail to correct the deviations, then formal change requests to the baselines become necessary. We are a ISO 9001:2015 Certified Education Provider. Since the project management plan is a formal document that is used to manage the execution of the project, it must receive formal approval. It has always been practiced informally, but began to emerge as a distinct profession in the mid-20th century. Thus, the phases of a project are closely correlated with that of the project cycle. It becomes less difficult for a project manager to get the project management plan approved, if: To understand how to build a career in project management, and how certification training prepares you for project management job roles in any industry, watch this video on PMP Certification Training. Each of these processes is necessary to ensure that the project stays on track and is completed according to the specifications. For instance, a software project may have requirement, design, build, test, implementation phases whereas a project to build a metro or a building may have different names for each phase. *Lifetime access to high-quality, self-paced e-learning content. This also means that the definition of the project is refined at each step and ultimately the purpose of the progress is enunciated. Project planning is a procedural step in project management, where required documentation is created to ensure successful project completion. This document is used to define the approach project team takes to deliver the intended project management scope of the project. \"Our customers come from all sectors and industries and range from small specialist SMEs to global brands. It has to be remembered that the term temporary does not apply to the result or service that is generated by the project. PMBOK®, PMP® and PMI® are registered trademarks of the Project Management Institute, Inc. Simplilearn is one of the world’s leading providers of online training for Digital Marketing, Cloud Computing, Project Management, Data Science, IT, Software Development, and many other emerging technologies.\n\nSouthern Technical College Nursing Program Reviews, Bernat Blanket Twist Yarn Beachcomber, Robert E Lucas Jr Economic Theory, Great Grey Shrike Call, Are The Bananas On My Tree Edible, Best Camera For Documentary Photography,", "pred_label": "__label__1", "pred_score_pos": 0.9849243760108948} {"content": "Silver Bullion\n\nSilver is a truly unique and timeless precious metal. It is demanded for both industrial purposes and as a secure store of value lasting throughout ancient civilization through modern times. There are a growing number of industrial uses for silver: smart phones, flat screen TVs and medical applications. Silver is a valuable and practical industrial commodity, as well as an appealing investment which has been used since Biblical Times.\n\nSilver Numismatic\n\nUnited States Numismatic Silver are legal tender coins manufactured before 1933 and are not eligible for IRA Investments. They are generally way over priced particularly when graded.", "pred_label": "__label__1", "pred_score_pos": 0.9995387196540833} {"content": "Prophet Patrick Buwemba\nCard image\n\nDouble mindedness\n\nDec. 4, 2019\n\nThe Chariot Eye\nSunday, 22-09-19\n\nProphet Patrick Buwemba\n\nDouble mindedness\n\n\nIf you see any stagnation in life, this might be one of the causes of that delay in man's life. Stagnation is mostly caused by the character of a person who tends to give attention to many ideas instead of focusing on one idea at a time.\nYou can only move forward if you teach yourself to make decisions once and for all.\n\nYou are finding it hard to make decisions because you have not prioritized the aspects in your life. All aspects cannot be equally important in a person's life but they are considered just as important by you.\nSo for the sake of speed,you make the decision on what to give focus. When you come to God, let all your trust be in him.\n\nMany have prayed and their life is not changed and they don't seem to understand what their problem is. Their problem is not their prayer, but in them doubting and this is caused by having different sources of faith.\nIf you will believe on God and have results, then your faith will stop being on these temporary things like jobs,money, human beings.\nOur God is a jealous God so decide today who you will serve!!\n\nLord,my God, I put my trust in you .", "pred_label": "__label__1", "pred_score_pos": 0.8093035817146301} {"content": "Smarthinking Writer's Handbook\n\nEvaluating Sources\n\nChapter 2: Section 3, Lesson 7\n\nAcademic papers and writing projects require the most relevant and authoritative sources you can find, but how do you know what the best sources are? Similarly, academic sources like journal articles and academic monographs (works on narrow, specialized topics) provide valuable, detailed information, but how can you tell whether the source you've found is a reliable one?\n\nThe Internet has changed how people perceive the credibility of sources; you need to be more aware than ever of the quality of your research. You’ll find a lot of resources in an online search: there are many highly credible academic blogs, but you’ll also find many journals that are not peer-reviewed; you’ll find biased and personal websites as well as websites that are professionally researched, edited, and published. The boundaries between research methods—like using the library, doing field research, and using the Internet—have broken down. Using the library now often means using the Internet to access the library, and conducting an interview often means using email to send the questions and gather answers. In order to effectively evaluate sources, you should first understand two important types of sources.\n\nTypes of Sources\nWhether you find your source in print, online, or in a different medium, it will fall into one of two basic types—primary or secondary.\n\nPrimary Sources\nA primary source is a document, object, communication, or other material from the time period or issue you’re studying. If you conduct field research, the information you gather is from a primary source. Any results of observations, surveys, or interviews are primary data, whether those surveys and interviews took place in person, by email, or by other electronic means. If you conduct an experiment in a biology or psychology class, the resulting data are primary. If you conduct a literary study, then the primary source is the piece of literature that you need to research. Primary sources include historical documents as well as physical objects such as artifacts.\n\nSecondary Sources\nIn contrast, secondary sources are ones that comment on, analyze, critique, or reflect on primary sources. Secondary sources often include books about your subject, journal articles, blog entries, websites, newspaper articles, and social media commentary about a topic you’re researching. A secondary source may come from any number of publications discussing your topic.\n\nDistinguishing Types\nBoth primary sources and secondary sources can be relevant to and necessary for a given research topic. Depending on your assignment, the topic you’re researching, and the requirements of your instructor, you might use only primary sources, only secondary sources, or a mix of both.\n\nIt can be easy to confuse the two types of sources, especially given the way the Internet has challenged the traditional boundaries mentioned above. A source that is “secondary” for one assignment can be “primary” for another assignment.\n\nFor example, if you were researching the Iraq War, first-hand reports from Iraq by citizens and soldiers would be primary sources, while articles, blog posts, and social media posts about the war from commentators, writers, and others would likely be secondary sources. However, if you were researching social media responses to the Iraq War, the social media posts themselves would be primary sources; newspaper articles about social media would be secondary sources.\n\nIf you’re confused as to whether your source is primary or secondary, try to identify its relationship to your topic. Is it a source that originates from the time period or issue you’re researching (that is, a primary source), or is it a derivative source that comments on, critiques, or analyzes the primary source (that is, a secondary source)?\n\nEvaluating Sources\nWhen conducting research, you should choose the best sources to use in the paper. The following list provides just a few of the criteria you can use to help you evaluate and choose sources:\n\nThink about whether you actually need the information. Don’t use a source simply to lengthen your bibliography or essay. Every source should be both important to and necessary for your paper.\n\nHow is the author of the source identified? What connection does he or she have to the material? For example, does the author have a degree in the field in which he or she is writing? How extensively has he or she published in this area? If the source is not academic, what personal or professional connections does the author have to the topic? Look for the author’s biography or credentials in the source itself, or search for the author’s name online.\n\nCredibility deals with whether the source is believable or trustworthy. What stated or unstated political, corporate, social, or ethical goals does the author carry? Separate from the author, who is hosting, publishing, or promoting the source and why? How might these factors, motivations, and goals affect the source’s credibility? How trustworthy is the author? Do there appear to be obvious or ambiguous omissions or even errors?\n\nPublication Date\nBooks, journal articles, magazine editorials, field research, and websites often indicate a publication date. In electronic sources, the publication date can be confused with other dates, such as dates regarding the last time a website was docs. A blog will often display many dates—dates for individual blog entries, comments, replies, etc. Use the date that is most relevant to the item you’re considering. If a book lists multiple dates on its copyright page, the most recent date is usually the publication date for that edition. On a blog post, look for the date associated with the specific entry you’re reading. Note that undated sources aren’t necessarily worthless. Limited edition publications, primary sources, and historical material might be undated but still very valuable based on other criteria, such as author or relevance, especially if the date or time period can be guessed. Think twice about using undated sources with other warning signs, though. Such sources might include undated personal websites containing general information; anonymous, undated blog comments; and undated social media posts that can’t be traced to a specific user or person.\n\nEvaluating the audience is a matter of considering for whom the source, information, or item was published, photographed, written, or compiled. Who did the author, creator or publisher hope would read or access this material? What is the author’s agenda or bias? For example, is the author hoping to influence a specific demographic, person, organization or group of people? Or is the author explicitly or implicitly advocating for a specific change of some kind, whether social, economic, or political? The same questions can be asked of the publisher, not just the author.\n\nLength is an important factor for any source, but it’s not a defining one. An academic journal article can provide detailed information about a topic. An academic or professional blog can provide a concise opinion from a scholar in the field in less than a few hundred words. The amount and type of information your assignments require will help you determine which sources to use.\n\nThink About It\n\n • What kind of research will you use—secondary sources, or primary sources, or both?\n • Where will you find these sources?\n • How will you know whether your sources are credible?\n\nEvaluating your sources requires that you understand the type of source and that you think about its credibility based on at least some of the criteria discussed above.", "pred_label": "__label__1", "pred_score_pos": 0.9504737854003906} {"content": "BSR HERproject Impact Portal\n\nA portal to record surveys and generate reports for their partners.\n\n\nThe HERproject seeks to empower women in the workforce around the world. BSR needed a web portal and mobile app to help interviewers fill out surveys as well as generate reports on the results.\n\n\nIt helps BSR's partners such as Nordstrom, Samsung, and Target work with factories, suppliers, and other workplaces in developing countries to evaluate the well-being of their workers, especially women.\n\n\nOur solution kept BSR from having to manually manage survey responses and generate reports. This reduced errors, saved time, and made the processes more scalable.\n\nHow big?\n\nBSR and its partners who represent some of the largest retail goods brands in the world measure work, health, financial, and self-esteem conditions in hundreds of workplaces using the portal and mobile app.\n\nOur Role\n\nSolspace created a Laravel framework powered Portal, where BSR administrators can manage partner accounts, enter survey data, and view reports based on those surveys all in an offline environment.\n\n\nThe Portal framework offers maximum flexibility on modifying data organization and concepts with time and has the ability to store data offline for later upload once internet access is available.\n\nHelping understand Women's Health, Finances, and Self-Esteem in the Workplace\n\nBSR runs HERproject, an endeavor to help better understand the health, financial, and self-esteem situation of Women in developing countries. BSR approached Solspace with the need to conduct surveys in areas of the world where even internet access may be scarce. Survey data needs to be gathered, stored, and processed to produce reports for BSR's partners in the project.\n\nData collection was to be conducted on either the portal or on tablets when interviewers were in the field. Most solutions assume an always-connected environment, so this was a unique requirement.\n\nLaravel development\n\nA close-to-the-metal, fully customized experience\n\nSolspace needed a way to develop a portal and mobile app with maximum flexibility while avoiding having to fight software that uses its own nomenclature and development approach.\n\nThe Laravel framework was a perfect fit for this and enabled a portal developed with maximum flexibility while keeping the technical jargon to a minimum. Instead of discussing sections, channels, entries, custom fields, etc., BSR and Solspace could refer to BSR's terms: surveys, questions, answers, workplace programs, reports, etc.\n\nAdapting to changing needs\n\nWith maximum flexibility and ample libraries and resources for Laravel, Solspace was able to provide for BSR's needs and adapt the portal to their changing methods.\n\nCertain types of fields that weren't editable could be made editable. Relationships between concepts understood by BSR could be modified with ease. New data models and calculations could be created. APIs can be built. Export of large data sets could be constantly improved. All this is available while keeping the basic concepts in a language understood by BSR.\n\nApi integrations\n\nStore offline, offload later online\n\nThe mobile app had a particular requirement to be able to store survey data on the device while the device was offline, and allow to upload the stored data to the online portal once the BSR staff member returned to an environment with internet access.\n\nSolspace made use of available storage methods available to web browsers, as well as a mobile development framework to detect the online/offline state of the application. We also created an Android app that can store dozens of survey entries while offline, and upload them to the portal later.", "pred_label": "__label__1", "pred_score_pos": 0.9332000613212585} {"content": "Ukrainian programmer received the award from Apple for the best game\n\n\nMaxim Hryniv received the prestigious award for the Apple Mobile Games «iPad Game of the Year» for game «Contre Jour».\n\nMaxim developed the game seven months and two more expected release of the game. The game was released August 24, 2011. Contre Jour was also the first game for iOS, has received a nomination for the E3 from GameCriticsAwards.\n\nPreviously, the game received a nomination and win in the category «iPad game of the Year» in Germany, Italy, the Netherlands, the United Kingdom, France, Spain, Japan and other countries.\n\nIn Contre Jour main character is a creature that passing the obstacles and collecting various items enhances their skills. The game contains 60 levels of varying difficulty.\n\nAward iPad Game of the Year is considered one of the most prestigious handed her only once a year, and just one game.\n\nLike this post? Please share to your friends:", "pred_label": "__label__1", "pred_score_pos": 0.9929004907608032} {"content": "Williams wins Roland Garros\n\n\n\nOriginally published on: 08/06/13 00:00\n\nThe victory was Williams’ 16th on the Grand Slam stage and second in Paris, marking an incredible turnaround from the same event last year when she lost in the opening round. That unlikely defeat to Virginie Razzano was the spark that lit an inferno of determination in Williams and since then the American has posted a remarkable record of 74 wins to just three losses, including titles at Wimbledon, the Olympics, the US Open and now at Roland Garros.\n\nThe matchup between two of tennis’ biggest global stars marked the first French Open final since 1995 to feature the top two ranked players in the world and it was the No.2 seed Sharapova who started the better of the two. \n\nThe Russian, who hadn’t beaten Williams since 2004, was looking to become just the sixth woman to defend a title in the French capital and her determination was evident from the start as she fist-pumped and muscled her way into an early 2-0 lead.\n\nWilliams responded immediately, surging ahead 4-2 and although the defending champion managed to level things once more at 4-4 it was the world No.1 who clinched the first set 6-4.\n\nWilliams, who came into the contest on a 30-match winning streak, failed to capitalise on five break points in the opening game of the second set but when the opportunity to break the Sharapova serve arose once more in the third game she seized it to lead 2-1.\n\nThe pair traded breaks from there on out and when Williams was forced to serve for the title she produced the most clinical game of the match, firing down three aces and a forehand winner to take the set and with it a second French Open crown.\n\nWilliams’ victory in Paris came 11 years after her first, the longest distance between Grand Slam wins in the Open Era and she now sits just two major titles behind Chris Evert and Martina Navratilova, who have each won 18.\n\n\nCopy link", "pred_label": "__label__1", "pred_score_pos": 0.9376267790794373} {"content": "The Author’s Corner with Jennifer Goloboy\n\nCharlestonandtheEmergenceofMiddleClassCultureintheRevolutionaryAmerica.jpgJennifer Goloboy is an independent scholar based in Minneapolis, Minnesota. This interview is based on her new book, Charleston and the Emergence of Middle-Class Culture in the Revolutionary Era (University of Georgia Press, 2016).\n\nJF: What led you to write Charleston and the Emergence of Middle-Class Culture in the Revolutionary Era?\n\nJG: The project originally started because of a graduate school class I took with David Hancock, in which we read the Henry Laurens papers.  I was fascinated by Laurens as an exemplar of the eighteenth-century middle class.   He had a rigidly hierarchical view of the world.  He demonstrated a weird blend of public sanctimony and private willingness to betray his own principles, especially when engaged in the slave trade. \n\nWhen Prof. Hancock told the class there weren’t any other collections of letters from Charleston’s merchants that were as interesting as the Henry Laurens papers, I took it as a personal challenge.  \n\nJF: In 2 sentences, what is the argument of Charleston and the Emergence of Middle-Class Culture in the Revolutionary Era?\n\nJG: My book is designed to help us clarify what we mean by “middle-class” in Early America.  Focusing on merchants in Charleston, South Carolina, it shows how the economic impact of the post-Revolutionary transition shaped middle-class culture.\n\nJF: Why do we need to read Charleston and the Emergence of Middle-Class Culture in the Revolutionary Era?\n\nJG: For readers interested in class in early America, my book is unusual in that it focuses on work rather than the home as a cradle of middle-class culture.  Charleston’s merchants used shared cultural assumptions to connect with their business partners.  These assumptions changed over time.  Before the Revolution, the ideal merchant was deferential and polite; the post-Revolutionary merchant was a rowdy sport willing to do anything to serve a client; and the cotton-port merchant was a professional and an institution-builder.                  \n\nReaders interested in Charleston will remember that historians have rarely written about the city between the end of the Revolution and the late 1810s.  So there’s been a mysterious and unexplained transition in local behavior: before the Revolution, a happy participant in British mercantilism, but after the gap, disdainful of trade.  This book argues that Charlestonians distrusted merchants because of a forgotten post-Revolutionary bubble, based partly on the slave trade and neutral trading with the Caribbean, which ended disastrously because of the War of 1812.  This is important because antebellum Charleston was so central to Southern intellectual history; we need to know that resentment of mercantile outsiders was not a natural product of the cotton empire.\n\n\nJG: I really became interested in history when I realized that the point was not to eulogize heroes of the past, but to explain the distinct internal worlds of our ancestors.  I was a big fan of the “If You Lived In” series as a kid— and now I torment my poor children by telling them what “If You Lived In Colonial Times” left out.\n\nJF: What is your next project?\n\nJG: As I was researching this project, I realized how much we still have to learn about American trade in the years before the War of 1812.  They’re exciting years in economic history: lots of smuggling, lots of semi-licit trade between Europe and the Caribbean.  Stephen Girard, as one of the most important merchants of his era, kept track of the goings-on in all the ports touched by his business— I intend to use his papers to clarify this confusing era.\n\nJF: Thanks, Jennifer!", "pred_label": "__label__1", "pred_score_pos": 0.9830114841461182} {"content": "G(x) = Z(x)T b (3-3) where x is the vector of input random variables. With the polynomial approximation G(x), the probability of failure can then be calculated inexpensively by Monte Carlo simulation or FORM/SORM. Since the RSA is constructed in random variable space, this approach is called stochastic response surface approach. Stochastic RSA can be applied in difference ways. One approach is to construct local RSA around the Most Probable Point (MPP), the region that contributes most to the probability of failure of the structure. The statistical design of experiment (DOE) of this approach is iteratively performed to approach the MPP. Another approach is to construct global response surfaces over the entire range of the random variables, where the mean value of the random variables is usually chosen as the center of DOE. The selection of RSA approach depends on the limit state function of the problem. Global RSA is simpler and efficient to use than local RSA for problems with limit state function that can be well approximated globally. Analysis Response Surface (ARS) Approximation for Reliability-Based Design Optimization In reliability-based design optimization (RBDO), the SRS approach needs to construct response surfaces to limit state functions at each point encountered in the optimization process, which requires a fairly large number of limit state function evaluation and RS construction. The local SRS approach is more computationally expensive than the global SRS approach due to multiple iterations involved in the RSA construction. This dissertation (see also Qu et al., 2000) developed an analysis response surface (ARS) approach in the unified system space (x, d) to reduce the cost of RBDO, where x", "pred_label": "__label__1", "pred_score_pos": 0.9873383045196533} {"content": "Michigan IT Jobs\n\nMobile michigan-jobbank Logo\n\nJob Information\n\nEmergent Holdings Senior Analyst -- Provider Delegation in Lansing, Michigan\n\nEMPLOYMENT QUALIFICATIONS:EDUCATION:Bachelor's degree in a related field. Continuous learning, as defined by the Company's learning philosophy, is required. Certification or progress toward certification is highly preferred and encouraged.EXPERIENCE: Two (2) to four (4) years experience in related field. Analyst experience required with proven experience in operational analysis, data analysis, and problem resolution type activities.SKILLS/KNOWLEDGE/ABILITIES (SKA) REQUIRED: * Analytical, organizational, planning and problem solving skills * Understanding and knowledge of the business, products, programs, corporate organizational structure (including functional responsibilities), and basic research principles/methodologies * Ability to plan, organize, direct, and control projects. * Excellent written and verbal communication skills. * Ability to lead and contribute to process improvement projects. * Ability to read and interpret documents such as data flows, process flows, technical diagrams, operating and maintenance instructions, and procedure manuals. Ability to write routine reports and correspondence. Ability to speak effectively before groups of customers or employees of organization. * Ability to apply common sense understanding to carry out instructions furnished in written, oral, or diagram form. Ability to deal with problems involving several concrete variables in standardized situations. * Administer and adhere to corporate and departmental policies, practices and procedures. WORKING CONDITIONS:Work is performed in an office setting with no unusual hazards.The qualifications listed above are intended to represent the minimum education, experience, skills, knowledge and ability levels associated with performing the duties and responsibilities contained in this job description. We are an Equal Opportunity Employer. Diversity is valued and we will not tolerate discrimination or harassment in any form. Candidates for the position stated above are hired on an -at will- basis. Nothing herein is intended to create a contract.SUMMARY:The Senior Analyst is an analytical role responsible to coordinate the development and implementation of Provider Delegated Groups with our Health Plan Clients. Senior Analyst ensures all Health Plan operational activities including Claims Routing and Payment and assignment of Members to Provider Delegated Groups is essential to the effectiveness of the Program. Responsibilities includes identifying opportunities to improve performance of program through process review activities.RESPONSIBILITIES/TASKS: * Researches and monitor performance of Provider Delegated activities through data analysis * Performs claim reconciliations of claims processed by Provider Groups contracted with Health Plan Clients * Proactively Develops and improves work flows and business processes within area(s) to improve customer service, decrease operational costs, and improve overall quality. * Identifies and/or analyzes business problems and devise procedures for solutions to the problems. * Effectively leads projects in order to produce desired results. * Responsible for corporate communication of project results. * Recommends and assists with implementing standard policies and procedures. * Assures that corporate compliance is communicated, implemented, and monitored on an ongoing basis. * Participates in systems testing, develops procedures/controls, and provides recommendations for the ongoing improvement of the updated process. * Assists personnel (both in", "pred_label": "__label__1", "pred_score_pos": 0.9883613586425781} {"content": "Cantilevered Songs\n\nCantilevered Songs by John Lent leverages aims to make poetry useful in the sense that we all live somewhere, come from somewhere, hear things, see other things and remember.\n\nJohn Lent\n\nReaders familiar with John Lent's work will be drawn into Cantilevered Songs by his impressive ability to make poetry useful, not in the sense that it will solve problems, or create codes or alibis for how live. No. Useful in the sense that we all live somewhere, come from somewhere, hear things, see other things, and remember. When we share this with others as writers do, we transform the ordinary. We make it magical; make it important. This is Lent's gift — to remind us all that we have lives worth thinking about; to remind us that our own backyards, roads home, work, play and love are uncommon wonders. This is what he means when he says: \"Play that song. Play it again. Now, improvise.\"\n\nLent's poetry gains its energy from his own recognition of its usefulness as much as it gains its art from his own experiences with music, art, family friends and the his work as a teacher, musician and writer in the Okanagan. And while it is important to recognize his structured play with visual architecture, to make the poems resemble what they observe, to capture the cadence of those crazy personal mysteries, to hear the backbeat moments of when you catch a big and strange idea sideways and then it disappears, in the end it is the small, but beautiful, epiphany of feeling triumphant for no reason other than you have lived. (from Thistledown Press)\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7597726583480835} {"content": "Please do not be confused by the term “power of attorney.” Many clients believe this term has something to do with the lawyer preparing their estate plan. Clients sometimes mistakenly fear that they are giving over some kind of power to their lawyer to make decisions for them. This is not true.\n\nWhen you grant “durable power of attorney” to another person—any other person—you are designating that person as your agent, to act on your behalf. This may be your spouse, your child, a friend, or anyone, as long as he or she is an adult (eighteen or older) and not under a conservatorship or incarcerated. Now and then, someone may indeed choose an attorney for their agent, which adds confusion to the term.\n\n“Durable” means “continuing even when you are incapacitated.” Indeed, these documents are generally written so that these powers are only granted while you are incapacitated and unable to act on your own. These are called “springing” powers of attorney, because they spring into action upon your incapacity.\n\nIf you are elderly or facing a long-term illness, you may consider gently easing someone you trust into the role of your “agent,” helping you through powers of attorney, over a period of time. This might be a sibling, a spouse, a child, or someone else you truly trust. This person should understand that if you have a stroke or other sudden decline, they will have to jump in with both feet.\n\nIf you think you may someday need to go further, and give full control to someone as conservator, you should nominate a person for that job too. This nomination is contained in the durable power of attorney for property (conservator of the estate nomination) and in the advance healthcare directive or durable power of attorney for healthcare (conservator of the person). These nominations may also be available in a separate document—apart from the durable powers of attorney for property or healthcare.\n\nIf it came to the need for a conservatorship—if, for example, you became a danger to yourself or others—a court would have to investigate and confirm your nomination. Your nominee would have to go through a criminal background check, a credit check, and more. But you would have had primary input. If you have not made a nomination, state laws indicate a priority of appointment typically based on your family tree and the laws of “intestate succession.”\n\nRegardless of the situation, clear your decision with your designees and nominees while you still can. It’s a heavy responsibility to take on either power of attorney or to become a conservator, and you want to make sure everyone will agree to serve.\n\nDo not surprise a loved one with this responsibility when you are hit by a car. For one thing, they may say no.\n\nIf you are the person caring for someone with a mental incapacity, you may at some point have to consider a conservatorship. Sometimes, you simply have no other choice.\n\nI know a woman who is taking care of her husband with dementia. He had always been a loving and gentle husband and father. But the disease is destroying his judgment, and little by little he is becoming violent. Recently, when they were in the drive-through line at a burger place, he just randomly let loose and clocked her. Knocked her out cold.\n\nNow, it is truly her responsibility to go to court and apply for a conservatorship to have him institutionalized against his will. It happens.\n\n\nIn Mistake #9, we learned that living trusts are not generic, cut-and-paste documents. The same is true with power of attorney documents. For starters, you will be asked to grant separate powers for property and for healthcare decisions.\n\nWhen you grant property power to your agent, you are authorizing this person to make decisions about your property and your finances while you are incapacitated—and to take specific responsibility for paying your bills, maintaining your online accounts, contributing to, managing, or withdrawing from your IRA, and the thousand other financial responsibilities we all face.\n\nYou may or may not, however, want this same person making healthcare decisions for you.\n\n\nYou should also understand that even powers of attorney for property may be best divided.\n\nIf you own a business, you may want a different person to make business decisions during your incapacity than the person making your personal financial decisions.\n\nYou may want a different person making your investment decisions than the person handling your day-to-day finances.\n\nYou may also want to grant powers of attorney which are not durable, but end when you lack capacity. This may prevent, for example, a business partner from taking some action while you are out with a stroke.\n\nNondurable powers may empower a spouse or a business partner to make crucial decisions every time you are on vacation in remote locations, and then disempower them again when you return.\n\nAnother important question involves gifting. Most power of attorney documents I have seen do not include gifting authority—in other words, the agent you name during your incapacity generally does not have the right to give away your property to anyone else.\n\nHowever, the power for one spouse to make a gift of their assets to another may be crucial in public assistance benefit planning, as you will see under “Monetary Fallbacks for Disability,” below.\n\nWork closely with your attorney to discuss these decisions and craft these documents. Consider your choices carefully—they may be the most important choices you ever make.\n\n\nIf you are incapacitated with an illness, even if you are just under sedation for an hour-long operation—who do you trust to have your best interests at heart and make the right calls with doctors? Approve treatments? Argue with hospitals to keep you longer?\n\nIf you lose mental capacity due to stroke, dementia, Alzheimer’s, Parkinson’s, or other common conditions, who do you trust to move you from nursing facilities to home and back again?\n\nEvery one of us should choose a trusted person, discuss the responsibilities with that person, and update your choice as often as necessary. The power to make medical decisions for us when we cannot do so is called a “durable power of attorney for healthcare,” and is granted through a pretty straightforward document.\n\nThe document says simply, “If I cannot make healthcare decisions for myself, then this person or these people can make them for me.” You can name more than one person to serve jointly, or you can name them to serve consecutively. If this person cannot serve, then the power falls to the next, and etc.\n\nOnce again, a “power of attorney for healthcare” has nothing to do with the attorney writing the document. You can grant the healthcare power of attorney to anyone.\n\nIf you have a primary residence in one state and a vacation home in another, we recommend to our clients that they create a durable power of attorney for healthcare for each state, because a lot of the related laws are state-specific.\n\n\nA second document works closely with the power of attorney for healthcare decisions.\n\nThe Health Insurance Portability and Accountability Act (HIPAA) created significant restrictions on who has access to your healthcare information. Although it boosted privacy, it also created barriers to swift decision-making and intervention by loved ones. If a doctor or hospital divulges your health information to someone without the proper authorization, they face huge fines—as much as $50,000 per violation, in some situations.\n\nAs a result, all health professionals and organizations take HIPAA rules very seriously.\n\nThe HIPAA authorization you sign gives authority to one or many people to have full access to your health information. As previously discussed in the Introduction, you may want to expand this authorization well beyond the person you have granted your power of attorney for healthcare. For example, you may want a home healthcare worker to be able to call up and check on your prescriptions, even if you don’t want this person to make major medical decisions for you.\n\nThink through your HIPAA authorizations carefully with an expert lawyer. In some cases, for example, you may want to have separate HIPAA authorization documents for different people and circumstances.\n\nAlthough HIPAA is a federal law, there is no federal HIPAA form. Each state has its own. In my home state of California, for example, a HIPAA authorization must be printed in fourteen-point type to be valid!\n\n\nA “living will,” sometimes known as an “advance healthcare directive,” tells medical personnel, loved ones, and the person you have given power for healthcare decisions your preferences for medical care in dire circumstances, “in advance.” A living will generally comes into play only when you are in the late stages of a fatal illness, fall into a coma, or have suffered an extremely serious injury.\n\nPlease do not confuse “living will” with “living trust.” They are completely unrelated documents, with different purposes.\n\nIn most cases, the goal of a living will is to give permission to loved ones to let you pass away in order to avoid unnecessary suffering. Most living wills say, in essence, “If I’m a goner, let me go.”\n\nWhen my grandmother had a heart attack, my grandfather called the paramedics. It was a massive heart attack. The paramedics rushed over, got out their paddles, and shocked her heart back to life. Then they put her on a ventilator and took her to the hospital. But she never recovered consciousness, and never showed signs of recovering the ability to breathe on her own. The doctors said there was no hope, and indeed, when I looked at her, I could see that her soul had probably already left her body.\n\nMy grandmother had created no living will and had never even discussed this possibility, so the decision to terminate life support was made even more difficult for my father and his two older brothers. After a week, my father and his brothers made the agonizing choice to terminate life support. Ten years later, my father still asks me, “Did I do the right thing?”\n\nI tell him that I was very close to my grandmother. And then I say, “Of course, you did.” I say this because there really was no alternative. But the choice would have been much easier if she had made her own desires clear in a living will.\n\nI will not go into all the specific details of a living will, such as how it relates to “Do Not Resuscitate (DNR)” and “Physician Orders for Life-Sustaining Treatment (POLST)” orders. Instead, I refer you to your attorney. Just make sure you get the appropriate legal and medical advice.\n\nFor more information or to receive a consultation with one of our attorneys, attend one of our FREE seminars.", "pred_label": "__label__1", "pred_score_pos": 0.5309696197509766} {"content": "Sao Tome to 'host' Bafana in SA\n\nSA National Teams\n\nSAFA have confirmed that Bafana Bafana's upcoming back-to-back 2022 Africa Cup of Nations qualifiers against Sao Tome and Principe will both be played in South Africa.\n\nBafana are set to face Sao Tome in their third and fourth round fixtures in Group C this month as they look to take a step closer to the continental showpiece in Cameroon.\n\nREAD: Bafana squad to face Sao Tome\n\nCurrently in second position behind Ghana, with one defeat and one victory thus far, Molefi Ntseki's charges will be looking to claim six points from the upcoming two encounters against the 182nd FIFA-ranked islanders.\n\nTheir chances of doing so have now been boosted with an agreement signed between the two football associations that both fixtures will be played in South Africa.\n\nBafana were scheduled to host the first fixture in Durban on November 13 (19h00), before travelling off the coast of Guinea for the return leg in Sao Tome.\n\nREAD: SAFA explain Le Coq raincoat moemish\n\nHowever, the STFF have agreed to play their 'home' fixture in Port Elizabeth on November 16 (15h00), due to the ongoing travel restrictions amid the Covid-19 pandemic that may cause logistical issues.\n\n\"The two countries mutually agreed that due to the ongoing covid-19 pandemic, it was in the best interest of the two that they do everything in their power to safeguard the interest of players and officials. Therefore, both parties agreed that the first and return leg matches will all be played in South Africa,\" read a statement from SAFA.\n\n\"In this respect, SAFA undertakes to bear the costs of the travel [round-trip flight] of the National Team of Sao Tome and its officials.\n\n\"SAFA also undertakes to bear the costs of the accommodation of the National Team of Sao Tome and its officials during the period deemed necessary.\"\n\nREAD: Chiefs, Bucs, Downs stars off to Saudi\n\nCheck out these 12 skilful stars Bafana coaches ignored", "pred_label": "__label__1", "pred_score_pos": 0.9987655282020569} {"content": "Introduction to cyber security: stay safe online\nIntroduction to cyber security: stay safe online\n\n\nFree course\n\nIntroduction to cyber security: stay safe online\n\n3 Two-factor authentication\n\nSo, if a password isn’t secure enough, perhaps having two pieces of information is more secure? This is known as two-factor authentication and you’ve almost certainly used it without realising.\n\nWhen you take money out of an ATM you have to give the bank two pieces of information – the first is the data stored on your bank card, the second is the PIN. Individually, neither can access your account, but when brought together they allow you to withdraw money.\n\nSome banks have given similar two-factor authentication to online banking customers – in this case accounts need to be unlocked with the combination of a password and a four or six digit number generated on a hardware banking card reader. If you use online banking and don’t have a card reader device it will be well worth finding out if your bank offers them to customers, and if they do not, consider switching to a more secure banking service.\n\nBanking card reader\n\nThe banking card reader reads the account details from your bank debit card, which includes your account number and a hash of your pin. It will also require you to enter a pin to log in, and if the pin matches the hashed pin this reader can generate passcodes that can be used on the banks website to authorise log in and for certain transactions. The banking card reader confirms that you both have the card and know the pin, without the need to enter a pin on a web page.\n\nTwo-factor authentication on the web\n\nA number of companies, including Apple, eBay, Google and Microsoft support two-factor authentication (2fa) to improve the security for their web users. Rather than a single password, two-factor authentication requires the user to enter two pieces of information – their password and a changing value which is either sent by the website to their mobile phone, or generated by a companion application on the user’s own computer.\n\nDepending on the site, it might be necessary to enter the two values every time (which is inconvenient), or after a period of inactivity, or it may be possible to tell the site that the computer which has already been authenticated should be trusted in future and a single password will be sufficient to allow you to use the site (although this raises a security weakness if the machine should be stolen).\n\nThis method of two-factor authentication works well as protection against random attacks. However, if you are being specifically targeted by the attacker, the attackers have found it quite easy to take over the user’s phone number and then intercept authentication messages. They don’t need to steal the phone to do this. Criminals can locate the telephone number and date of birth on social media, and then ask for the number to be transferred to a new sim with a new provider.\n\nOne way to greatly reduce this risk is to use a dual sim phone with a number on a pay-as-you-go tariff where the balance remains indefinitely – you usually have to make one call every 6 months to keep the sim working. Only use that number for two-factor authentication, not for anything else and never publish that number.\n\nAlternatively, use a separate very basic phone or an old phone with a new pay-as-you-go sim purely for authentication. Switch it on only when you want to get an authentication. Don't used the phone for making phone calls. Don’t publish the number anywhere.\n\nIf your phone number stops working contact your phone provider immediately to check why. It might have been diverted.\n\nA much more secure method of two-factor authentication is to use a special hardware security key on the computer instead of the phone. This restricts authentication to the computer with a unique hardware security key.\n\nAnother place where you might have come across two-factor authentication is if you’ve ever connected to a virtual private network (VPN), which is a type of encrypted network connection. (You will cover VPNs in more detail in Week 5.)\n\nThe organisation that owns the network you are connecting to will give you a card or device, often called a VPN token, that can be used to generate a sequence of random characters. When you try to connect to the VPN, you will first be asked for your password (the secret based on something you know) and then will be challenged to provide some information from the VPN token (the secret based on something you have).\n\n\nTake your learning further\n\n\n\n\n\nRequest an Open University prospectus", "pred_label": "__label__1", "pred_score_pos": 0.6467689275741577} {"content": "Fast Facts about Fidelity Bonds and Public Official Bonds\n\nFast Facts FidelityFidelity and public official bonds both involve protection from fraudulent or dishonest behavior by individuals. Are you worried your employees might steal from you? Then you should look into fidelity bonds. Are you a public figure required by law to be bonded? If so, you will need a public official bond.\n\nOld Republic Surety offers both types of bonds, which can be required by law, contract, or by an entity that simply wants to be protected in a “what if” situation.\n\nFidelity Bonds\n\nA fidelity bond is a type of insurance that protects businesses from losses incurred as a result of fraudulent or dishonest acts (as defined within the policy) by employees or specified individuals.\n\nAlthough it is referred to as a bond, a fidelity bond is technically an insurance policy. It is not tradable and cannot accrue interest the way an investment bond does. A fidelity bond is also known as employee dishonesty insurance and covers a variety of dishonest or fraudulent acts by employees or other individuals. Some examples of fraudulent acts covered by a fidelity bond include theft, embezzlement or forgery.\n\nFidelity bonds can be purchased for specific individuals in a company, such as those who will have access to funds or bank accounts. Blanket fidelity coverage can be purchased to cover a greater number of employees, with a specified loss limit.\n\nA fidelity bond can also provide a business with extra protection in areas that may not be covered by another property-casualty policy. For instance, a crime policy may not provide adequate coverage for some types of employees or may not cover all fraudulent acts or situations.\n\nThere are basically two types of fidelity bonds:\n\n • First-party fidelity bonds (or blanket coverage) protect businesses against wrongful acts (fraud, theft, forgery, etc.) committed by its employees.\n • Third-party fidelity bonds protect businesses against wrongful acts committed by people working for them on a contract basis (e.g., consultants and independent contractors).\n\nThere are also more specialized fidelity bonds. ERISA bonds protect 401K and retirement plans from dishonesty and fraud committed by individuals associated with the management of the covered plans. There are also fidelity bonds specifically for businesses whose employees are in possession of customers’ property (such as valet parking services, cleaning companies, or courier services).\n\nPublic Official Bonds\n\nPublic official bonds are required by statute as a guarantee that officials will faithfully and honestly perform their duties in office.\n\nLike other surety bonds, public official bonds are a three-party agreement between the principal (the public official), the obligee (the government or public), and the surety that underwrites the bond.\n\nAlthough specific requirements vary depending on state or local statutes, public official bonds are typically required for most individuals who hold a public office, whether appointed or elected. Individuals whose positions require bonds include mayors, sheriffs, judges, court clerks, tax collectors, treasurers and town administrators or supervisors.\n\nThe bond requires the individual to reimburse the governmental entity that obliged them to be bonded and to pay a fixed amount if they do not faithfully or honestly perform their duties in the office. A variety of public entities require public official bonds. They can include governments (federal, state, county, municipal), courts, school districts and universities.\n\nOld Republic Surety provides a variety of fidelity bond coverages as well as public official bonds, although the processes differ depending on the individual, business type, or the official’s position. Some bonds are easily issued, while others require credit histories or a review of the entity’s controls (for example, countersignature of checks, third party bank reconciliation or regular audits) that are in place to protect their assets and funds.\n\nIf you have any questions about about fidelity, public official bonds, or related blanket coverage, please contact your nearest local Old Republic Surety branch.\n\n\nBecky Nichols\n\nCommercial Surety Underwriting Consultant", "pred_label": "__label__1", "pred_score_pos": 0.6763245463371277} {"content": "They're still lying about the first Gulf War: How the first George Bush helped create today's Middle East trouble\n\nThe first Gulf War was not the good one, and 25 years later, as false history hardens, we must remember why\n\nBy Darin Strauss\nFebruary 28, 2016 10:00PM (UTC)\nmain article image\nGeorge H. W. Bush, Saddam Hussein (AP/Ron Edmonds/Photo montage by Salon)\n\nThere are in American life few really unassailable opinions—especially when the calendar turns its depressed pages on primary season. That’s when the circular firing squad fills the air with the tang of smoke and cordite. But sometimes you can find agreement, even in primary season. Sometimes you can even find something like unanimity.\n\nTed Cruz has won applause in recent debates by citing what is seen as America’s last unambiguous victory. To defeat ISIS, he said, we should look to the first Gulf War. (Which ended 25 years ago today.) Cruz wants a repeat of that stormy desert operation, with its thousand-plus air attacks in 37 days —and with all its attendant destruction. “There ain’t much left” to a place after such a campaign, Cruz said with a smile.\n\n\nOhio Gov. John Kasich has likewise argued that we’d beat ISIS if we just called upon “the coalition that we had when we went to the first Gulf War.\" Likewise, Donald Trump has been sure, when dismissing the Bush family legacy, to separate the calamities of the son from the victories of the father. Even Michael Dukakis, in an interview this month, praised how George H.W. Bush handled that war.\n\nSo, something that’s lauded by everyone from Cruz to Dukakis to must be an unmitigated good, right? Well, maybe not. Let’s take a look. It’s not hard to see so many of our troubles getting their start in 1991’s glowing sand.\n\nThe Gulf War—that is, the effects-laden franchise opener, and not the bloated sequel—did mark a great victory, by at least one measure.  In turning back Saddam Hussein and liberating Kuwait, the United States lost 148 soldiers in combat; the Iraqi military in the same period endured up to 22,000 casualties.  So, yes, of course: a victory. But of what kind?\n\n\nThe Gulf War marked the first time in the modern era that we sent our military to fight an Arab-world enemy. Think about that. What has seemed an awful but inescapable part of American foreign policy—the drawn-out struggle against one Islamic foe or another—began in that war. And our having waged that war is precisely what first inflamed the region’s zealots against us. Think about that, too. Not many remember this, but what first motivated Osama bin Laden to attack the United States? It was intolerable to an Islamist such as bin Laden that—because of the fight against Saddam—there were \"infidel\" American troops in Saudi Arabia, home of Islam's two holiest sites, Mecca and Medina.  \n\nOf course, the father’s Gulf War also served as a prelude to the son’s Iraq War.  Which is to say that in 2004, America went in and finished off Saddam, at least partially because of W.'s unfinished Freudian business there. \n\nYes, well (you might argue), we needed to go fight Saddam in 1991, in order to protect our great ally Kuwait (which Iraq invaded at the end of 1990)!  But, that’s not so. The Gulf War should never have been fought.\n\n\nIn the lead-up to the invasion of Kuwait, the United States’ ambassador to Iraq, April Glaspie, met with Saddam.  According to a transcript of that meeting released by the Margaret Thatcher Foundation, Ambassador Glaspie told Saddam, “We have no opinion on your Arab-Arab conflicts, such as your dispute with Kuwait. Secretary Baker has directed me to emphasize the instruction, first given to Iraq in the 1960s, that the Kuwait issue is not associated with America.  \n\nThis led many to conclude that, in the words of Sir Edward Mortimer, “It seems [likely] Saddam Hussein went ahead with the invasion because he believed the U.S. would not react with anything more than verbal condemnation.”\n\n\nWe’re not great at looking back in this country; we’re not great at drawing the lessons from what happened the day before yesterday. But on this anniversary of the Gulf War, you’ll hear politician after politician celebrate what happened in Iraq 25 years ago.  Take a moment to think about how different the world might look—might feel—if we’d never kicked that hornet’s nest.\n\nDarin Strauss\n\nDarin Strauss's latest book,\"Half A Life,\" won the National Book Critics Circle Award. He is a Clinical Professor at NYU. @darinstrauss\n\nMORE FROM Darin Strauss\n\n\nApril Glaspie Editor's Picks George Bush George W. Bush Iraq War Isis Saddam Hussein", "pred_label": "__label__1", "pred_score_pos": 0.5617070198059082} {"content": "Henri Cartier-Bresson’s India: Father of modern photojournalism’s rarely seen photos\n\nThe Rubin Museum of Art in New York City will present “Henri Cartier-Bresson: India in Full Frame,” an exhibition opening on April 21, 2017, illustrating the pioneering photographer’s perspective on India during a period of political and cultural turmoil.\n\n\nAt the time, India was undergoing a massive political transition, having gained independence from British colonial rule and been partitioned from Pakistan. In January 1948, Cartier-Bresson traveled to Delhi to meet with one of the key players in that transition, Indian independence leader Mahatma Gandhi.\n\nIt would be one of Gandhi’s final meetings before his assassination at the hands of a Hindu nationalist on Jan. 30 of that year.\n\nThe exhibition, which coincides with the 70th anniversary of the founding of Magnum Photos, features a selection of 69 images showcasing the photographer’s perspective on Gandhi’s final day, key political events, and everyday moments in mid-20th century India.\n\nCartier-Bresson, called the father of modern photojournalism, is best known for street photography, which he developed during his travels around the world and which has influenced generations of photographers. The exhibit is organized by the Rubin Museum of Art in collaboration with Magnum Photos and the Henri Cartier-Bresson Foundation.\n", "pred_label": "__label__1", "pred_score_pos": 0.9999421834945679} {"content": "Instructions for Collaborators\n\nThese instructions are intended for PEM collaborators with little or no experience in indexing plainchant and polyphonic sources. The instructions were developed collaboratively by Elsa De Luca, Bernadette Nelson and João Pedro d’Alvarenga with the collaboration of Zuelma Chaves and Manuel Pedro Ferreira. De Luca contributed mainly to the instructions for indexing plainchant while Nelson and Alvarenga focused on the polyphonic sources.\n\n\nPEM is part of the Cantus Index Network and is connected to other international medieval music databases by means of unique Cantus ID numbers. PEM’s instructions for indexing plainchant are based on the rules originally established by the CANTUS Database (now Cantus Manuscript Database), which was the forerunner of online medieval music databases for plainchant sources. We encourage PEM collaborators working on plainchant to consult the useful online resources available on Cantus Manuscript Database for indexing manuscripts, mainly:   \n\nThese resources provide specific information that can greatly facilitate scholars who read a liturgical manuscript for the first time and want to understand its liturgical contents and create a musical index of its chants.\n\nPEM shares the aims of the International Musicological Society’s Study Group Cantus Planus: to encourage international cooperation; to facilitate relations between researchers and musicological projects in all countries; and to promote the free exchange of data in electronic form.", "pred_label": "__label__1", "pred_score_pos": 0.9999783635139465} {"content": "Nar*Rating Environmentalisms: Non*Human in Figurations Knowledges on Conservation, Endangerment and Environmental Justice in Selected Kenyan Eco-narratives.\n\n\nJames Wachira\n\nResearch Area:\n\n\nThis study is on poetry and knowledge production. Specifically, it focuses on a critical reading of selected ritual poetry of the Samburu and Maasai of Doldol. The reading aims at critiquing: first, the fictional representation of the nonhuman in the ritual poetry. The nonhuman in the poetry comprises some plants; goddesses, mountains, rivers and livestock. Second, it aspires to analyse the agency of the nonhuman in the figuration and representation of the Samburu and Maasai indigenous ecological knowledge that finds representation in the genre. The interpretation aspires to explain how ecological crises like drought and floods constitute agency that accounts for the creation of the poetry. The poetry transforms into a space where these communities figure and represent how ecological crises affect them, hence, a justification of the ultimate aim and need to mitigate them. Thus, the critique of the poetry hopes to also explain the way the poetry serves as an epistemological space through which the communities concretize the desires.", "pred_label": "__label__1", "pred_score_pos": 0.9905587434768677} {"content": "Question: Why Is Mexican Food Unhealthy?\n\nDoes Mexican food make you gain weight?\n\n\n\nIs Mexican food high in carbs?\n\nAt a Mexican restaurant, just watch out for beans or corn which is sometimes added, these will definitely spike you over 20g of carbs. If you’re going for salad greens, cheese, beef or chicken you’re going to be looking at less than 10g of carbs which is a pretty good option.\n\nWhy are refried beans bad?\n\nThe animal fat and large amounts of added salt are what makes refried beans unhealthy. For instance, many store-bought refried beans contain up to 22% of the recommended daily value (DV) for sodium per serving, with 3-4 servings per container. It’s easy to overeat too, so you might be eating more than recommended.\n\nAre tacos really Mexican?\n\nA taco (US: /ˈtɑːkoʊ/, UK: /ˈtækoʊ/, Spanish: [ˈtako]) is a traditional Mexican dish consisting of a small hand-sized corn or wheat tortilla topped with a filling. … Tacos are a common form of antojitos, or Mexican street food, which have spread around the world.\n\nWhat is the healthiest Mexican food to order?\n\nEat This, Not That: How to Order Healthy Mexican FoodFresh corn tortillas, not chips. The basket you get as soon as you sit down is hard to resist. … Tostada salad, not taquitos. Taquitos are also deep fried and typically don’t include any vegetables. … Grilled fajitas, not wet burritos or chimichangas. … Soft corn tortilla tacos, not hard tacos. … Salsa, not sour cream.\n\nAre fajitas fattening?\n\nFajitas are much healthier than fried items but are just as filling; they taste even better when flavored with peppers and onions. Margaritas might taste delicious, but they are loaded with calories and sugar.\n\nIs Taco Bell healthy?\n\n\nIs tortilla chips and salsa a healthy snack?\n\nA simple way to start eating healthier is by consuming more nutritious snacks. Rather than grabbing a bag of chips before class; whole grain tortilla chips and salsa make a great alternative. … Salsa can be helpful in increasing your vegetable intake while minimizing sodium, fat, and calorie intake.\n\nWhat is the most authentic Mexican dish?\n\n8 Traditional Mexican Dishes That Are a Must-Try① Enmolada.② Posole (or Pozole)③ Tortas.④ Chiles en Nogada.⑤ Chiltomate.⑥ Tacos de Papa.⑦ Sopa de Lima.⑧ Cemita Poblana.\n\nWhat makes Mexican food authentic?\n\nHere are a few key signature aspects of traditional Mexican cuisine to help you distinguish authentic Mexican from Tex-Mex dishes: fresh and healthy ingredients such as tomatoes, chiles, not jars of store-bought salsa for example. traditional spices (such as coriander and epazote) instead of cumin or dry oregano.\n\nAre Mexican beans healthy?\n\nIn a taco or as a side, black or pinto beans are a healthy pick. They’re usually slow-cooked with onion, garlic, and spices. A half-cup packs in 8 grams each of fiber and protein. Plus, research shows these beans have more disease-fighting antioxidants than many fruits and vegetables.\n\nCan I eat Mexican food on keto?\n\n\nWhat is the healthiest bean you can eat?\n\n\nWhat Mexican food is low calorie?\n\nBoth tortilla soup and posole are relatively low-calorie and incredibly rich in flavor. Order a cup for an appetizer instead of chips and dip. These three items are healthier options than ground beef, refried beans, and heavier salad dressings or dips. Make these swaps where you can.\n\nCan you lose weight eating Mexican food?\n\nMexican food, with its focus on lots of lettuce, black beans and vegetables can be very healthy and low in calories, so long as you pay attention to what your order. Visit a Matitto’s near you to enjoy our delicious – and not fattening, when served correctly – Tex Mex meals!\n\nDo burritos make you fat?\n\nBut when wrapped together in a six-inch flour tortilla and topped with sour cream and guacamole, they add up to a ton of calories. Even if you use fresh ingredients and simple cooking preparation, a typical burrito is easily 1,000 calories.\n\nAre burritos really Mexican?\n\nThe Mexican burrito may be a northern variation of the traditional taco de Canasta, which is eaten for breakfast, lunch, and dinner. Although burritos are one of the most popular examples of Mexican cuisine outside of Mexico, they are only popular in the northern part of Mexico.\n\nWhy are tacos bad for you?\n", "pred_label": "__label__1", "pred_score_pos": 0.6229488849639893} {"content": "What Helps Digestion After Overeating?\n\nWill 2 days of overeating make me gain weight?\n\n\n\nWhat to do after a night of overeating?\n\n\nHow do you cleanse your body after a binge?\n\nTry these tips to get back on track and feel less awful about yourself:Drink less during the week or cut out alcohol completely. Drink water with dinner instead of alcohol and be sure to hydrate well throughout the week. … Cut out the extra. … Eat fiber. … Skip the nighttime snack.Exercise.\n\nHow do you Debloat your stomach?\n\n\nDoes drinking water help with bloating?\n\n\nWhat not to do after eating?\n\n\nHow many hours without food is considered an empty stomach?\n\nThe F.D.A. defines an empty stomach as “one hour before eating, or two hours after eating.” The F.D.A.’s two-hour rule is just a rule of thumb; the stomach will probably not be completely empty. The specific definition of an empty stomach varies from drug to drug.\n\nIs it bad to sleep after exercise?\n\nIn general, feeling sleepy after exercise isn’t a cause for concern. It’s normal to feel tired after physically exerting yourself. This is more likely after intense workouts. For example, you can expect your energy levels to dip after a long run or high-intensity interval training.\n\nHow long does it take for food to digest after overeating?\n\n\nHow do I get rid of bloating after eating too much?\n\nThe following tips can help reduce or prevent bloating after eating:Do not eat too much fiber. … Be aware of food intolerance and allergies. … Avoid high-fat foods. … Drinking and eating slowly. … Avoid carbonated drinks. … Ginger. … Avoid chewing gum. … Light exercise after eating.More items…\n\nIs it bad to sleep after overeating?\n\n\nShould you Undereat after overeating?\n\nIt will affect your performance. If you’re trying to make gains in the gym, perform well on the field or just generally have enough energy to get through your day, you should get back on track with a full day of calories and macros. Undereating can mess with your energy levels and ability to recover.\n\nHow do you speed up digestion after overeating?\n\n\nWhat relieves bloating instantly?\n\n\nIs it OK to shower after eating?\n\n\nHow long does bloating last after overeating?\n\nThis can come in the form of bloating, gas, acid reflux, nausea, or diarrhea.” It often takes up to five hours to feel good again, but the more you eat the longer it’ll take to digest. When this happens, we often wish we had a pair of pregnancy pants laying around.\n\nCan I lay down 30 minutes after eating?\n\n\nShould I fast after overeating?\n", "pred_label": "__label__1", "pred_score_pos": 0.9996465444564819} {"content": "Question: How Do You Fix Abandonment Issues?\n\nIs it bad to get attached too easily?\n\nBeing in a relationship feels safe and secure to some women.\n\nSo if you attach too fast, you may be scared that you will always be alone and single.\n\nAnother reason some women attach too fast is because they are missing something in their life..\n\nHow can I be happy single?\n\n\nCan adoption cause abandonment issues?\n\n1. It is very common for those who were adopted to feel rejected and abandoned by their birth parents. This is accompanied by feelings of grief and loss. There is no set time or age when these feeling surface but, sooner or later, they do.\n\nWhat does abandonment do to a person?\n\nAbandonment fears can impair a person’s ability to trust others. They may make it harder for a person to feel worthy or be intimate. These fears could make a person prone to anxiety, depression, codependence, or other issues. Abandonment issues are also linked to borderline personality (BPD) and attachment anxiety.\n\nCan you get PTSD from abandonment?\n\n\nWhy do I feel clingy?\n\n“Often, it can be due to feelings of insecurity, self-doubt or anxiety about the future,” she said. “A lack of confidence in relationships can also contribute to clinginess. … To those who are clingy, extreme thoughts and actions look and feel a lot like love and intimacy; and they don’t want to let a good thing go.\n\nWhat are the signs of abandonment issues?\n\nSigns and symptoms of abandonment issues in adults include:always wanting to please others (being a “people pleaser”)giving too much in inability to trust others.pushing others away to avoid rejection.feeling insecure in romantic partnerships and friendships.codependency.More items…•\n\nAre abandonment issues a mental illness?\n\nThey may also exhibit behaviors that push people to leave so they’re never surprised by the loss. A fear of abandonment isn’t a recognized condition or mental health disorder, per se. Instead, it’s considered a type of anxiety and is treated as such.\n\nWhy do I get attached so easily to guys?\n\n\nWhat is emotional abandonment in marriage?\n\n\nHow do you know if a guarded person loves you?\n\n\nWhat do you say to someone with abandonment issues?\n\n\nHow do you overcome emotional abandonment?\n\n\nWhy do I get attached so easily?\n\nWe attach ourselves for two reasons: 1) because we haven’t felt so accepted and understood in a long time by anyone and 2) being with that person makes us feel complete, happy, fulfilled etc. Feelings we can’t imagine generating by ourselves. … You can love a person without being addicted to him/her.\n\nWhat is abandonment abuse?\n\n\nCan you ever get over childhood trauma?\n\n\nWhat does emotional neglect feel like?\n", "pred_label": "__label__1", "pred_score_pos": 0.6208071112632751} {"content": "4 Ways the Best Sales Teams Beat the Market – Daniel Birke, David Sprengel, Jochen Ulrich , and Michael Viertler – Harvard Business Review \n\n\nGrowth vs. Profit: What Should Rising Startups Focus On First? \n\n\nThis really is not a simple question to answer. There are so many nuances that go into assessing the right answer:\n\nWhat is going on with the economy?\nHow liquid is the fundraising climate?\nAre you B2B or B2C?\nAre you the first mover?\nHow defensible is your business, with patents, product complexity or otherwise?\nWhat are your competitors doing?", "pred_label": "__label__1", "pred_score_pos": 0.8048957586288452} {"content": "Skip to main content\n\nSurprise as the new normal – implications for energy security\n\n\nWe are living in a world of increasing interconnectedness through digitalisation and globalisation, exacerbating environmental conditions, severe economic challenges, uneven distribution of wealth, and geopolitical crises. The world is a complex system and the rapid change among its sub-systems builds up pressure for any efforts to anticipate change and shape the processes of transformation. Surprise is an intrinsic aspect of change, in particular when it takes place at an accelerating pace with high degrees of volatility, uncertainty, complexity, ambiguity (VUCA) - or within the condition of post-normality as described by Ziauddin Sardar. Emerging technologies such as AI and renewable energy systems add to the complexity of societies, and thus to the world of VUCA and post-normality. In foresight horizon scanning has much focused on the probable or even predictable -surprise-free developments. More emphasis should be paid on systematic anticipation of wild cards and black swans, and on the analysis of weak signals. Foresight should also focus on discontinuities - broader phenomena and developments instead of single events. Energy is a complex issue. Without energy there is no life, neither biological nor economic. Taking into account the huge ecological and social costs of the present energy system, the need for a new emission-free, cost-effective, and democratised energy system is obvious. An energy transformation to reach 100% renewable energy is envisioned in four transformational neo-carbon energy scenarios. Energy is increasingly a societal and even cultural issue - above all a security issue. As regards energy security, various sudden events and surprises could play a major role. New energy systems themselves, with other new technologies, nudge the world into unknown, discontinuous directions. Therefore, we probe the resilience, anti-fragility and discontinuity of these transformational, societal energy scenarios. The results of a futures clinique where the scenarios were tested are presented. Implications of surprises for energy security, as the world increasingly seeks to move towards a renewable energy based society, are explored.\n\n\nThe world is in constant change, and still, it seems that we think in a linear mode. Today’s world is increasingly interconnected through digitalisation and globalisation, exacerbating environmental conditions, severe economic challenges, uneven distribution of wealth, and geopolitical crises. Emerging technologies are expected to transform tomorrow’s world in unforeseen ways [78 Footnote 1]. Change, including that deriving from the emergence of technologies, should be understood beyond risk assessment, but also in terms of the unpredictable [1, 2]. Nation-states claim independence and sovereignty for themselves, but their autonomy is restricted by the tsunami of trans-border flows of trade goods and finance, of information, people, weapons, technology, energy, emissions, and pollution. The world is a complex system and the rapid change among its sub-systems builds up enormous pressure for any efforts to anticipate change and shape the processes of transformation.\n\nEnergy plays a central role in enabling change and increasing its pace and complexity. The more energy humans are able to harness, the more complex societies are enabled [3]. The whole human history and its development can be seen as the mastery of new sources of energy [4]. This paper argues that as humanity is anticipating a transition into renewable energy systems – and towards the potential of energy abundance they promise [5, 6] – broad and deep discontinuity developments should be paid more attention to.\n\nEnergy itself is a sector facing massive change pressures [7, 8]. Energy is not only an economic or technical issue, but increasingly a societal and even cultural issue – above all a security issue. Risks are conceived to be an intricate part of the energy sector because of economic interests, geopolitics and environmental issues such as nuclear waste. Changes in energy prices alone are enough to shock entire nations. The 2011 Fukushima disaster was not considered possible, because the risk probability of a tsunami and an earthquake combined was judged negligible [9]. Energy security, as security of supply [10, 11], has been applied to conceptualise the complexity of energy in foreign and energy policy [12]. Problematically, conventional energy security analysis, including when looking at unexpected events, has primarily focused on a set-up of fossil fuel and nuclear energy technologies [13].\n\nMany energy security analyses omit potential future changes in the energy mix, the implications that a growing uptake of renewable energy could have [14, 15], and the influence of broader societal transformations. The first attempts to address energy security in a renewable energy world are emerging [16,17,18], but few efforts to date capture the true complexity to reach or sustain such a future society. A growing body of literature examines energy transitions to understand energy landscape changes [19,20,21]. This includes studies on a 100% renewable energy system as a neo-carbon energy system [14, 15]. “Best-guess” future conditions might not be enough, and therefore multiple plausible futures should be considered [22]. Non-linearities, various sudden events and surprises – wild cards and black swans – could play a major role. New energy systems themselves, with other new technologies, nudge the world into unknown, discontinuous directions.\n\nA renewable energy based future may be a desirable one, but in envisioning transformations, renewable energy pathways and futures have to be tested for resilience for both internal and external events [23]. This can enhance the ability of a future system to cope with change. This provides us with the theoretical framework of radical change: exploration of transformational possible futures, built on discontinuities towards the preferred future of renewables. The research question is how to dwell deeper into uncertainties, discontinuities and surprises as preparation for the forthcoming change. The prevalent hypothesis is that by paying more attention to discontinuities and surprises a better understanding of change could be formed. For the purpose, as a part of a foresight research project, a hybrid method experiment was conducted to describe discontinuities and possible black swans on uncertainty “soil”. It consisted of the use of transformative scenarios, ideation of discontinuities and black swans, cross-impact analysis of the imagined black swans on the scenarios, and a Futures Clinique [72], a special type of a futures workshop [24].\n\nRenewable energy driving the VUCA world\n\nThis chapter opens up the features of the complexity and change as manifested in the VUCA world concept. The concept of VUCA is relevant when discussing and constructing scenarios for the renewable energy transformation within the context of societal change – renewable energy may further the VUCA world, as the following will claim.\n\nVUCA world\n\nIn recent times, companies, governments and international organizations have paid increasing attention to risks and vulnerabilities [80, 81,Footnote 2]. For good reasons, disruption has become one of the key terms in discussions about innovation, economic and societal change. We seem to live in a world of permanent and profound change, driven by technology, by the requirements of sustainability and human development, and by rather unpredictable societal and political processes [25, 26]. Concepts like “megatrends” or “grand challenges” are coined to describe the underlying phenomena with their tensions and contradictions.Footnote 3 Often far reaching characterizations and interpretations are given. From a systems theoretical perspective, dynamic complexity (“dynaxity”) causes rapid, erratic processes with sudden tipping points where a system transgresses its former behavioural boundaries and starts to display completely new traits. Indicators from fields as different as finance, mobility, and lifestyles support the hypothesis that we live in an Age of Acceleration, which means higher frequencies of innovation, faster economic processes, increasing societal fluidity, and faster paced political decisions. Some researchers even speculate that we might approach within the next three decades a “technological singularity” where technological change becomes so rapid and profound that it represents a rupture in the fabric of human history [27]. Even if we do not follow Kurzweil, the main message is quite obvious: the future will not be like the present – and not even resemble the future we have been used to.\n\nOn this background, it makes sense to break down the present challenges for decision makers in four main dimensions, for which the acronym VUCA has found wide spread use: V for ‘volatility’, U for ‘uncertainty’, C for ‘complexity’, and A for ‘ambiguity’.Footnote 4\n\nV for ‘volatility’ describes the increased dynamics in many fields characterized by “changing directions of change”, by a high frequency of ups and downs, by more rapid disruptions of trends. The paradigm is given by the stock markets that have become more volatile after the financial crisis of 2007 – with impacts on all economical spheres. In recent years, a rather high volatility can also be observed in political processes, at least in democratic states. Furthermore, PR departments and marketing experts complain about a more erratic behaviour of consumers, quickly shifting demands and preferences. It seems obvious to regard increased connectivity and (social) media at least as one of the main catalysts of volatility. From systems theory we know that the volatility of system parameters increases when it approaches a tipping point [28]. Interestingly, energy markets are also affected by an important volatility, caused in parts by new technologies, but also by lifestyle changes. This creates opportunities for new market entrants – and it makes radical energy scenarios, such as neo-carbon scenarios based on renewable energy [7] more plausible. Is there already a tipping point approaching?\n\nU for ‘uncertainty’ indicates a fundamental condition that decision makers have met in all ages. The lack of predictability, however, has become more prominent during the last decades, since the impacts of innovations, the outcome of political developments, and shifts in lifestyles have increased. Objective indeterminacy due to internal and external factors that are beyond control is complemented by subjective unpredictability due to a lack of knowledge about the dynamics of large, interconnected economic and societal systems. Chance combines with choice [29]. A multitude of actors with different, often clashing interests attempt to influence the unfolding of events and to get their specific answers about the big challenges of our age. In sum, developments become unpredictable and full of surprises.\n\nEven most advanced prediction tools (e. g. use of big data and deep learning) have revealed fundamental limitations for social phenomena (see e.g. [30, 31]). In technology foresight, more humble approaches are now state of the art: technology forecasting (in the sense of predicting breakthroughs with definite timelines) has been supplanted by scenariosFootnote 5 and recently by hermeneutic approaches, the deconstruction of future images (“vision assessment”) [32]. For most challenges with long time horizons, optimism about “superforecasting” [33] seems not in place. However, one lesson can be drawn from forecasting exercises: one needs to distinguish first the realm of predictable developments, second the realm of black swans (unpredictable outliers), and third the vast space in between of rather well or rather poorly predictable events. In the sphere of intermediate predictability, such as stock market movements or elections, the difficulty of prediction depends tremendously on the details of the task (e.g. per cent margins, time horizons).\n\nIt would, however, totally miss the point to regard uncertainty primarily as a problem for decision makers. Uncertainty safeguards the openness of the future, and provides the space for human decisions.\n\nC for ‘complexity’ implies that there is a multitude of qualitatively different factors or elements that interact in many different ways. Complex systems display complex dynamics, often with self-organization and the emergence of novel structures. There are no clear-cut cause-and-effect chains, but intrinsic webs of interaction through which disturbances or disruptions propagate in elusive ways.\n\nWhen it comes to grand challenges, e. g. the transition to sustainable energy systems, there is always an interplay of many actors with their specific organizational or network structures (from centralized to peer-to-peer). In the last decades, with global networking, with social media, digitalization of the economy, linkages have become much closer, exchange much more rapid. From the decision point of view this produces “wicked problems” [34] without clear, simple, and lasting solutions, from a change-oriented point of view this produces opportunities to break up existing structures and to quickly shift to novel ones.\n\nA for ‘ambiguity’ describes the difficulties to understand and interpret novel, emergent or simply unusual phenomena, to make sense of them, to draw conclusions. Reality becomes opaque and hazy, one might confuse causes and effects, misread weak signals and even strong ones.\n\nAccording to epistemology, there is a tension between prediction and explanation. Understanding a system, interpreting its behaviour needs simple, straight-forward models, in difference to prediction that is usually based on complex models (mapping a multitude of influencing factors). “It is both possible to make sense of something ex post that cannot be predicted ex ante and to make successful predictions that are not interpretable” [30].\n\nIn many cases, ambiguity implies that there are competing haphazard interpretations based not only on diverging perspectives and differing interests (the usual reasons for dissent) but – on a deeper level – on the lack of applicable concepts and terms. Really new, “emergent” phenomena, sometimes heralded by weak signals, escape existing mental models.\n\nFutures research have a long tradition in embracing VUCA developments and in supplementing trend-based thinking by analyses of possible disruptions and corresponding extreme events [35, 36]. Concepts like “black swan” [37] and “wild card” [38, 39] capture in an almost metaphorical way key aspects of sudden changes in the mental landscape of the future. Black swans, wild cards and X-events are used almost synonymously to refer to sudden, surprising, unanticipated events with broad and radical consequences [40, 41], but to elaborate the three concepts, certain distinctions can be drawn.\n\nThe concept of black swan refers to a highly improbable event that is difficult to anticipate, but if realised, will have dramatic, global impacts. Black swans may be positive or negative by their impacts. According to Taleb [37], black swans cannot be foreseen, but clusters of weak signals may point out to a possible black swan. The impact of black swans is also difficult to assess. One is to calculate the power of a black swan by a set of criteria: rate of change, reach, vulnerability, outcome, timing, opposition and power factor [42]. Aven [1] claims “near-black swans” to be surprises as a sub-set of black swan conditions, where an event does not result in extreme consequences because the barriers work and extreme outcomes are avoided.\n\nWild cards are events or developments with a very low probability before they occur and with a very high impact on the system under consideration, e. g. in the business, political, or social sphere. From a methodological point of view, one can distinguish realised (“historical”) and potentially possible, imagined wild cards [43]. Like black swans, they can have either positive or negative impact. Because of the low ex ante probability combined with a broad and often radical impact, they emerge as a strategic surprise and very often provoke inadequate, delayed, badly aimed, sometimes only symbolic responses. While black swans are “unknown unknowns”, things we cannot name or beyond our minds, wild cards are events or developments we can with sufficient effort imagine and at least abstractly identify – so that large collections of wild cards can be established.Footnote 6 Such collection can help to promote “thinking out of the box” in foresight exercises and to extend both the space of envisioned futures and of options for action. Both wild cards and black swans are different from risks because their probability is difficult to assess, as singular events without any precedent. In assessing their impacts, they may be low probability/high impact, but it has to be guessed. Preparedness for surprises is necessary to avoid situations without any prophylactic – or even preventive! – measures or alternative planning [44]).\n\nExtreme events, or X-events, are considered in the short term mostly negative and problematic, whereas in the long-term they open up as opportunities - clearing out existing structures that are no longer serving a useful purpose. In this sense, extreme events are drivers of human progress [35, 36]. The motivation to understand X-events emerges from criticism of concentrating on trends. Trends are based on continuities, and thereby, the trap of linear thinking. It may be more relevant to explore trends in terms of how long they last, how they are going to end, and what can be expected to replace them [45]. Colonomos [25] points out that for anyone looking into the future the distinction between continuity and rupture is the first indication of importance.\n\nAnticipating the impacts of black swans and X-events is difficult because there is no historical precedent [36]. The aspect of surprise may be viewed as a relational one: black swans, X-events or wild cards should be assessed as relative to one’s worldview, knowledge and beliefs [2, 46]. Black swans, X-events or wild cards cannot thus be foreseen, but they can be imagined and described within the context of the observer. One also has to bear in mind that large technological, infrastructural, or economic transitions – like the transition to a neo-carbon economy – imply not only changes in the built landscape but equally deep tectonic shifts in the mental landscape. The most important black swans for renewable energy may possibly emerge from the fields of society and politics [44].\n\nRenewable energy system and the VUCA world\n\nTo mitigate climate change, it is evident that the structure of energy production must change. Today’s energy systems are still 80% reliant on fossil fuels [47, 48]. Therefore, humanity is at a historical crossroads, expecting an emerging transition from non-renewable to renewable energy systems.\n\nIt is often assumed that the transition to renewable energy requires reducing energy consumption, and that the energy abundance provided by oil has come to an end [49]. However, this may well not be the case. Today, global total primary energy demand is approximately 110,000 TWh.Footnote 7 By 2050, we may expect global total primary energy demand to be at least 130,000 TWh with significant increases in energy efficiency [50]. The energy system can be 100% by then [7, 51], and it can provide energy at lower prices than today [52], in some cases – such as in household solar PV systems – even with zero marginal costs [53]. Further, as opposed to the non-renewable energy system, the renewable energy system can be built as, at least partly, decentralised so that energy consumers will become prosumers [54].\n\nThus, in the relatively near future we may have a sustainable energy system that increases energy supply and energy efficiency, decreases the price of energy, and allows citizens and organisations to become energy producers. These changes, then, enable wide use of new technologies – such as artificial intelligences (AIs), smart cities, internet of things (IoT), robotisation, and ubiquitous virtual realities – and empower new actors, big and small. To meet sustainable criteria, also material production should be designed as sustainable – for instance as circular economy.\n\nSocio-political destabilization and, in the worst case, social collapse are often seen as among the consequences of decrease in energy demand [55] or of severely descending energy supply [56]. However, the opposite may also destabilize societies: an increase in energy supply. More and cheaper energy may promote the VUCA world – increasing volatility, uncertainty, complexity and ambiguity. If we are reaching sustainable energy abundance, the traits will only strengthen. More and cheaper energy with other new technologies means faster and deeper changes [3, 57] and realignment of power [53].\n\nComplexity can be seen as key here [58], as it is complexity that feeds to volatility, uncertainty and ambiguity. Societal complexity can be defined as differentiation in social structure (more parts and more types of parts to a system) and variation in organisation and ranges of behaviour [3, 59]. If increased energy supply allows for “more parts” (human and technological actors) and variation in organisation and behaviour, it should then also increase complexity, and with it, volatility, uncertainty and ambiguity.\n\nIt may therefore be that in the VUCA times, furthered by the renewable energy system, social and cultural stability decreases – which is both good and bad. In any case, we have to see the energy transition to renewables as a much more complex and multifaceted phenomenon than it is often understood. If progress is stable, predictable and controlled development, the VUCA times may render the world a more discontinuous.\n\nDiscontinuities and surprises in a world of complexity\n\nDiscontinuity is a feature of complex systems [60]. A system is complex, if it is interconnected with numerous other systems and if its cause and effect relations are not linear. The world economy is a complex system (virtually everything that happens in the world affects the global economy), whereas a combustion engine is not. If the world becomes increasingly complex, for instance because of the interconnectedness of nations, so should discontinuities increase, too, and the world becomes more volatile. The energy system is also an apt example of a complex system.\n\nInstead of trends, Futures Research pays increasing attention to black swans and wild cards (see above) and weak signals. Weak signals are signs – such as events, new technologies and novel practices – pointing to possibly emerging issues and phenomena which can either strengthen or wither away as time passes [61, 62]. They are the first symptoms of important discontinuities, warning signs, or new possibilities [63]. This is understandable, as future is about change, and most novel and exciting things emerge from weak signals and black swans. Weak signals are important indicators for upcoming potential change, impending wild cards or black swans. If they are properly identified, they can be used to discover latent processes, potential discontinuities (see below) and to give hints as to the approach of wild cards or black swans [28, 31, 64]. From this point of view, they are of utmost practical advantage as early warning signals [65].\n\nFurther, technological developments, increases in (renewable) energy supply and decreases in energy price could steer our world into unknown futures. If we subscribe to the idea that the world is becoming increasingly VUCA-like, imagining weak signals and possible black swans is becoming more and more crucial.\n\nWeak signals and black swans are, however, rather “unpractical” as a method for anticipation. As singular issues, phenomena and events, weak signals and black swans – which are besides by definition very difficult to anticipate – are not very reliable in trying to anticipate how the future will differ from the present. Trends, in turn, are more reliable, not only because they deal with things that are familiar to us, but also because they are constructed by different phenomena. For instance, the trend of increasing life-expectancies is not a singular issue but consist of numerous different factors.\n\nTherefore, in addition to weak signals and black swans, Futures Research should pay more attention to discontinuities. Saritas and Smith define discontinuities as “rapid and significant shifts in trajectories without the aspect of being mostly unanticipated or deeply surprising” which “[extend] beyond single events” and “fundamentally [alter] the previous pathways or expected direction of policies, events and planning regimes” [66].\n\nThe key elements in the definition are that discontinuities are not singular issues and events (but consist of different interacting trends, weak signals and black swans), and that they fundamentally alter the linear, known pathways. There is, however, no reason to define discontinuities as exclusively rapid shifts – they can as well be gradual, long-term and deep change processes. Saritas and Smith mention Facebook as one example of a discontinuity, but in fact the rise of Facebook was not a rapid shift [66]. Established in 2004, it took Facebook three years to reach fifty million users and eight years for a billion users.Footnote 8 Furthermore, Facebook was preceded by many other social networking sites and applications such as MySpace and the Finnish Irc-Galleria in the early 2000, Internet Relay Chat (IRC) in the 1980’s and Bulletin Board Systems (BBS) in the 1970’s. Perhaps, then, Computer Mediated Communication (CMC) is the deep, long-term discontinuity here, of which Facebook is only one, albeit the most known, manifestation.\n\nThe internet and the First World War are two other illuminating examples of discontinuity. Both are often seen as black swan events, although in reality they are the result of longer discontinuity processes – neither is an event which black swans by definition should be. The internet was invented in the 1960s, but began to spread and influence society in the early 1990s with the invention of the World Wide Web. The development of the internet was a gradual process rather than a single event, a discontinuity in relation to the centralised mass media technologies such as the television. There were also many other discontinuity processes during 1970s and 1980s that laid the groundwork for the spread of the internet, such as globalisation and transition from industrial to information economy. The First World War, in turn, had many underlying processes such as militarism, nationalism, and strategic alliances between nations. Eventually, the war was triggered by the assassination of Archduke Francis Ferdinand in 1914, an event that may be claimed to be a black swan. However, numerous other events might have had the same effect (Fig. 1).\n\nFig. 1\n\nA conceptual map of drivers of change with a view to continuity/discontinuity\n\nFrom this perspective, black swans and weak signals as single events and phenomena are less relevant than the wider and deeper discontinuity processes underneath them. Black swans and weak signals should be seen as tools to discover hidden discontinuity processes, which in turn help in interpreting the meaning and significance of black swans and weak signals. They should always be related to broader phenomena they are part and signs of. Black swans can thus be seen as the culmination, and weak signals as the “signifiers” [62], of discontinuity processes. According to van Notten et al. “Abrupt discontinuity tends to manifest itself through events but these are usually connected to underlying processes. In such cases, events are often the proverbial last straw that broke the camel’s back.” Along these lines, the fall of the Berlin Wall (a black swan) was preceded by discontinuities in the Soviet system, as for instance by Michael Gorbachev’s rise to power and the politics of glasnost and perestroika (ibid.) [67].\n\nIssues that constitute a discontinuity often emerge from different fields. The iPhone, for instance, is an innovative combination of existing technologies. Machine learning is starting to converge with other technologies in a variety of unexpected ways. Together with patient data and an algorithm, machine learning can predict breast-cancer risk 30 times as fast as a human can [68]. Solar photovoltaics were in use already in the 1990s, but have begun to spread only in recent years [52], especially as China has risen as a mass-manufacturer. Real transformations will come about when low-cost and abundant solar electricity is combined with, for instance, self-driving cars and smart-city technologies.\n\nThe issues and trends behind discontinuous development processes are often regarded as unrelated and irrelevant. Because of complex interconnections and apparent insignificance, discontinuities may not be easily recognised and are ignored [69, 70]. For instance, ecological deterioration can have a significant impact on the global economy, and tipping points may only be revealed ex-post, but this is seldom taken into consideration in economic projections. In this light, the rapid emergence of solar photovoltaics (PV) in the 2010s may also be better understood as a discontinuity built over time rather than a black swan event.\n\nAnticipating discontinuities and black swans - implications for energy security\n\nCasti emphasises the role of unexpected events, i.e. surprises for humankind by claiming “…off we go now into the land in which almost nothing is actually known but where much of our future lives will be determined” [14: 33]. If surprise is the new normal, its implications for energy security – our critical life supporter – should be anticipated by using various kinds of foresight tools. This chapter presents the results of a methodological experiment to anticipate and analyse discontinuities and black swans and their implications for renewable energy.\n\nA set of transformations to renewable energy is envisioned by four transformative neo-carbon scenarios 2050. These semi-backcasting scenarios represent energy futures based on renewable energy as radically different from the present, and contextualise such change with emerging societal futures. Instead of addressing the transition to renewable energy as an ecological or techno-economic issue, the scenarios probe alternative possibilities on how the society at large could change under the new energy regime. The scenarios are transformative and discontinuous, as none of them is a business-as-usual scenario and all assume deep societal changes. In all of the scenarios ecological values prevail (either deep ecological or practical). From a socio-cultural perspective, the core assumption of all of the scenarios is that peer-to-peer practices will strengthen – the scenarios map out different possibilities for a “peer-to-peer society” to organize (as centralised or decentralised). Peer-to-peer refers to self-organising individuals and groups. Renewable energy technologies have a potential to promote peer-to-peer, as it allows citizens to become energy producers and thus increase their independence [53]. The core technological driver towards peer-to-peer are, however, information and communication technologies, which have dramatically decreased the costs of information and self-organising [71].\n\nIn the Radical Startups 2050 scenario, startups with ‘radical’ approaches become the platform for self-organising citizens and drive the uptake of innovative energy solutions. In the Value-Driven Techemoths 2050 scenario, citizens self-organise within profit-seeking technology giants, where they help them solve energy problems commercially. In the Green DIY Engineers 2050 scenario, energy solutions are low-tech and citizens self-organise as local tribes, as the world faces an environmental catastrophe. New Consciousness 2050 scenario envisions a world where ICT and profound ecological thinking have brought about a thoroughly networked society without traditional organisations and institutions, and a new systemic way of conceptualizing the world [79].\n\nScenarios can be used as exploratory tools for exploring discontinuities of long-term energy transitions. In a Futures Clinique conducted in May 2017 in Helsinki, Finland, 39 participants in seven groups investigated central themes related to the scenarios to test the resilience of a renewable energy based society. Futures Clinique is a participatory and exploratory futures workshop used to tackle uncertainties, identify disruptions and generate innovations [72]. The aim was to identify different interlinked trends and weak signals to probe how they could shape the energy transformations – to a future renewable energy based world. The participants consisted of energy, innovation, economy and environmental policy experts, working alongside futures researchers and students. After documenting and reporting the results, the key insights are expected to inform further discussions about energy security at a research- and policy-level nationally and internationally.\n\nThe Futures Clinique proceeded in phases (Table 1). In the beginning, the scene was set with introductions to megatrends and trends that may enable ‘radical change’. This set the context for exploring future discontinuities and focusing on emerging issues and weak signals of change. There were two broader tasks: first to map out possible discontinuities to think about deep and cross-sectoral changes. After that, to ideate possible black swans and reflect on their impacts on renewable energy world. The discontinuities were anticipated through five pre-selected themes: 1) Politics: nation-states, governments, geopolitics, new ideologies; 2) Corporations and economy; 3) Civil society & peer-to-peer practices; 4) Robotisation & artificial intelligence; and 5) New lifestyles, chosen because of their significance in society and potential for surprises. Subsequent small groups elaborated on these themes.\n\nTable 1 Futures Clinique methodology to explore the implications of discontinuities and black swans for renewable energy and its energy security\n\nThe Clinique consisted of two sessions. The objective of the first session was to identify discontinuities related to the allocated theme of the group. The participants started by exploring how their theme is changing – discussing emerging issues, novel characteristics and dimensions. The ideas were noted down on post-its and those resembling each other were clustered. At the end, the participants classified the ideas that resemble each other into clusters, and gave titles for the found ‘discontinuity clusters’. In the second session, the implications of the discontinuities were systematically analysed. The discontinuities deemed as most discontinuous were chosen to elaborate what black swans could emerge from them. At the end of the session, the group considered what implications, either advancing or hindering, these black swans could have on the renewable energy world by 2050.\n\nAfter a qualitative content analysis on the groups’ results, six categories of discontinuities could be differentiated: 1) new risks, 2) converging technologies, 3) value changes, 4) environmental economy, 5) changes in big companies, and 6) geopolitical changes (Table 2). In the following we accordingly summarise the results in more detail, with the aid of these six categories. In interpreting the themes as results, it has to be borne in mind that, as Gordon warns, the choice of future events to test resilience may not be free of unintended bias [73].\n\nTable 2 Six areas for emerging discontinuities described in a Futures Clinique, with summarising narratives\n\nNew risks\n\nAs the world changes, new risks emerge, and oftentimes we do not know how to deal with them. Amidst turmoil, we are seeking for sources of trust − from ‘the new’ and ‘the old’. In the years to come, a major cultural issue concerns how the tensions of nationalism versus globalism and liberalism versus conservatism will play out. If nationalism and conservatism begin to strengthen, this could be a major discontinuity globally, and as such pose new risks. In turn, anticipated transformations imply that we have to think in advance of their winners and losers. If we are moving to a predominantly immaterial, creative and automated economy, what kinds of social issues will we have to deal with? New kinds of inequalities can also be a source of discontent, and cause severe risks.\n\nConverging technologies\n\nIn terms of technology, convergence may be one of the main factors that disrupts linear developments. In this respect especially the convergence of humans and machines, “the Internet of Everything” (IoE), and autonomous transportation are key. As artificial intelligences (AIs) become more developed, we may begin to think of them as our peers. Biochemical “robots” in our bodies would converge humans and machines in a very concrete way − and even change our consciousness if they had cognitive functions. The Internet of “Everything” refers to a situation where everything − our energy systems, businesses, leisure etc. − are thoroughly networked. Crowdsourcing and crowdfunding would become the prevailing norm, not the exception. If transportation became autonomous, it would not change only how we move but for instance how we socialize and design our cities. Transportation would become much more efficient, which would free city space for other uses and make crossing distances easier than today.\n\nValue changes\n\nChanges in values are fundamental, as value systems guide our behaviour. In terms of production systems, if more goods and services were exchanged peer-to-peer outside established market mechanisms, as already is happening, this could shape how we today perceive the “free market”. This, in turn, would have wide systemic effects. Whether we will live in market economies in the future or not, the rupture of hierarchies could be expected to change the world. Among many other things, it would make cultures more pluralistic, and more prone to change. Values are also connected to identities and how we perceive our place in the world. In times of rapid change and increasing social complexity, developing, searching and realising oneself would become even more important than today. Values could affect how we choose to allocate the use of resources and what we expect to disrupt current trends.\n\nEnvironmental economy\n\nBy 2050 the rise of an environmental economy may have changed societies much more than we can conceive today. Multiple new energy technologies and sources could lead to a situation where energy can be harvested everywhere. As an outcome, China, India and other developing economies, especially in Africa, might prosper in unprecedented ways. On the other hand, keeping the system running sustainably − including how circular economy can be used to deal with waste − is an immensely complex task. Information, big data analysis and artificial intelligences are thus imagined to be an integral part of an environmental economy.\n\nTransforming large companies\n\nThe Facebooks and Googles of tomorrow may develop as all-encompassing entities that are involved in virtually everything. This would change the nature of such companies as some kind of semi-public actors (which they to some extent are already). This could be a positive thing, if their vast resources are put to good uses, but on the other hand concentration of corporate power is always risky. In any case, it is deeply uncertain how these mega-corporations can change currently established paths. Already, the emergence of platform economy, resulting from technological change and peer-to-peer principles, has raised questions about the justification of profits, and raised proposals about changes in taxation. And, can small, nimble companies that use global networks challenge these giants?\n\nGeopolitical changes\n\nIt may well be that the power of ‘the West’ decreases in world politics − and thus its place and significance in steering the global development. However, in place of the current international norms, we fail not imagine what the alternative is. Except for authoritarianism, what would be the guiding values of a post-Western world? Perhaps some kind of religious, national/regional conservatism? Or a mixture of these two? And, if sustainability continues to gain importance, will this change geopolitics? Regarding the future, the core question in geopolitics is not which countries are expected to gain power at the cost of others, but what the cultural consequences of these power shifts will be.\n\nAs a follow-up of the futures clinique work the previous day, a small ad hoc group consisting of the research project staff and external experts convened to conduct a further, hybrid methodological experiment: a Post-Futures Clinique cross impact analysis with black swans. Out of the results generated in the futures clinique, black swans (or combinations of different black swans), which could emerge as surprising events from these discontinuities were chosen and refined for a cross impact analysis. Cross impact analysis was then used to examine them [74]. The anticipation of possible black swans was combined with a description of their possible impacts across the four transformative neo-carbon scenarios 2050, described briefly earlier in the chapter, into a cross impact matrix. Adapting from Petersen’s criteria [42] presented earlier (chapter 2.1), a more simplified version of semi-quantitative (QUAN) and qualitative (QUAL) implications was considered to score the black swans. Table 3 summarizes the results.\n\nTable 3 Post-Futures Clinique cross impact analysis with black swans\n\nAs presented in Table 3 in a synthesised and simplified form, five black swans altogether were selected for analysis and named: Total industrial revolution; Collapse of the United States of America; Mass deaths due to climate change; Revenge of the fossil fuel industry; and Digital Anarchy. It may also be concluded that the imagined black swans vary in terms of their impact, either positive or negative, impact (large or small), timing effects (first, then), and level of surprise. The chosen black swans are results from the Futures Clinique work. To meet the strict definition of a black swan they should, however, include an event that is now missing in the description. The event can though be imagined for each one of them, for example, the mass deaths due to the climate change could be depicted in specifying the event that will cause the deaths.\n\nThe black swans seem to have drastic impacts, several of them, while none seem to entirely collapse a scenario, at least indefinitely. They also have different indirect or direct impacts for energy security: 1) A holistic ‘clean’ industrial revolution likely would improve energy security. 2) The collapse of an influential state and a major energy player would surely induce instability, and consequently also influence energy markets. 3) If climate change effects increase instability and health costs, governments become increasingly strained. 4) An attack by the fossil fuel industry would not be unprecedented, but perhaps the participants anticipated it to find a new way or form. And, finally, 5) the effects of digitalization and self-organising are interpreted to lead in negative outcomes in terms of chaos. Then again, a positive interpretation of the same factors might emphasize localised energy solutions, which actually would have a positive impact for energy security.\n\nBlack swans are a useful tool to test scenarios, as they reveal possible need to re-visit the gaps within scenario stories. Instead of aiming to ‘save’ scenarios from black swans, it is more important to critically observe the future presented in it. A black swan event can be timed at any point of each scenario pathway, or at their end point, when it tests the resilience of a scenario as a future image. Do Black Swans advance, postpone or destroy a scenario? Is this change at the core of the scenario or not? An examination of black swans alone may be prone to leave out the richness of the scenarios, as only the main actors of the scenarios are addressed. An examination of discontinuities and black swans jointly can allow an enquiry of factors that can potentially build surprises.\n\nAnticipating discontinuities and black swans of renewable energy can be useful for enhancing the resilience of such possible futures. Resilience explains the resistance of a system to shocks and disasters, recovery ability, recovery times, and costs of recovery [75]. In a Futures Clinique, covering the broad range of discontinuities in detail is an ambitious task; but provides useful grounds for analysing their implications for energy security beyond conventional risk assessment. While feedback was not collected from the participants to evaluate the quality or impact of this process, the workshop participants are key stakeholders for this research question, expected to be able to carry the findings in their own future work. In the post-black swans session, the use of four transformative scenarios for each black swan allowed a differentiation to be made across a range of possible black swans and their contexts, to open up another level of different possible futures. Exploring discontinuities allowed for a depiction of a fairly rich ‘futures map’ [76]. Resilience could be understood a countering dimension for discontinuities and black swans, and rich futures maps may be important for resilience. It may help understanding how energy services can be provided in a future society even in the case of disruptions [77].\n\n\nThe future cannot properly be anticipated in a linear way only. Discontinuities, disruptions, and surprises are the robust building blocks of the future world.\n\nIn a VUCA world, anticipating energy futures is important. Not only has energy been narrowly defined, the way it has been analysed has left little room for imagining alternative development pathways. The dilemma of non-linear thinking has ignored multiple developments that, when put together jointly, may over time pose radical shifts in the energy landscape. The emergence of solar energy may be understood as a surprise, but it would be more accurate to conceptualize it as a discontinuity, building over time as an outcome of various developments, eventually intertwining with each other.\n\nIn anticipation, it is crucial to pay attention to not only trends but also to weak signals, and black swans as unexpected events. The aim was to overcome an omission of the complexity of the real and future world of forecasting exercises. Furthermore, besides identifying weak signals and anticipating possible black swans, special attention should be paid in probing discontinuities. Discontinuities are not sudden events or individual phenomena. They are long-term change processes which consist of different interlinking trends, weak signals, and black swans. For instance, new events and new policies can make scenarios shift [74], but discontinuities may question their assumptions altogether. It is precisely these broad and deep processes of change that, in the end, change the world.\n\nIn thinking of the rapid pace of technological development, one may make the claim that in the present, discontinuities are increasing (e.g. [36]). If this indeed is the case, it has partly to do with energy as well as new energy technologies. When new energy systems provide more energy than their predecessors, additional energy can enable the use of new technologies, to create even more complex societies. As we are preparing to take into use a renewable energy system that is increasingly distributed and can harness the abundance of solar and wind energy, changes could become faster, and even more transformative, than today.\n\nAnticipating discontinuities is helpful for semi-backcasting exercises on possible or desirable futures. This hybrid methodological experiment worked to refine understanding about an anticipated transformation. With the aid of the transformative scenarios and related themes, the Futures Clinique participants were able to explore the interdependencies of renewable energy and a future society. It allowed the participants to develop their understanding about alternative futures and open its implications for energy security. The black swans generated in the workshop and later analysed, exemplify unexpected events that could influence the scenarios and their energy security. The generated insights will be used to refine the final scenarios before their completion. Our scenarios have a socio-cultural element in them, which underscores the point about their societal significance. As the exercise was part of a broader foresight project, the findings are expected to also inform and feed further research and policy work about energy transformations.\n\n\n 1. 1.\n\n WEF (World Economic Forum) - The Global Risks Report 2017:\n\n 2. 2.\n\n\n 3. 3.\n\n The Millennium project uses the framework of 15 Global Challenges that is updated annually. The aim is to assess global and local prospects for humanity. Some of the global challenges are megatrends in themselves (such as sustainable development and convergence of IT) while many of them are key issues (such as energy, clean water, health) the development of which is critical for humankind. See:\n\n 4. 4.\n\n Originally, the acronym VUCA was introduced by the U.S. Army War College in the 1990s to describe the situation after the end of the bipolar world. Since then it has been used in the framework of foresight and strategic leadership.\n\n 5. 5.\n\n For several decades Japan has made large Delphi studies on technology at NISTEP (National Institute for Science and Technology Policy), whereas recently the effort has been changed into scenario construction.\n\n 6. 6.\n\n For a paradigmatic example see Ravetz et al. (2011).\n\n 7. 7.\n\n IEA 2016:\n\n 8. 8.\n\n Ben Foster: How Many Users of Facebook?\n\n\n 1. 1.\n\n Aven T (2015) Implications of black swans to the foundations and practice of risk assessment and management. Reliab Eng Syst Saf 134:83–91.\n\n Article  Google Scholar \n\n 2. 2.\n\n Aven T (2013) On the meaning of a black swan in a risk context. Saf Sci 57:44–51.\n\n Article  Google Scholar \n\n 3. 3.\n\n Last C (2015) Human metasystem transition (HMST) theory. J Evol Technol 25(1):1–16\n\n Google Scholar \n\n 4. 4.\n\n Osti G (2012) Frames, organisations, and practices as social components of energy. Int Rev Sociol 22(3):412–428.\n\n Article  Google Scholar \n\n 5. 5.\n\n Lord B (2014) Art & Energy: how culture changes. The AAM Press, Arlington\n\n Google Scholar \n\n 6. 6.\n\n Naam R (2011) Smaller, cheaper, faster: Does Moore's law apply to solar cells? Scientific American. Accessed 31 Jul 2017\n\n 7. 7.\n\n Breyer C, Heinonen S, Ruotsalainen J (2017) New consciousness: a societal and energetic vision for rebalancing humankind within the limits of planet earth. Technol Forecast Soc Chang 114:7–15\n\n Article  Google Scholar \n\n 8. 8.\n\n Bruckner T et al (2014) Energy Systems. In: Edenhofer O et al (eds) Climate change 2014: mitigation of climate change. Contribution of Working Group III to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change. Cambridge University Press, Cambridge/New York\n\n Google Scholar \n\n 9. 9.\n\n Paté-Cornell ME (2012) On “black swans” and “perfect storms”: risk analysis and management when statistics are not enough. Risk Anal 32(11):1823–1833\n\n Article  Google Scholar \n\n 10. 10.\n\n Sovacool BK, Brown MA (2010) Competing dimensions of energy security: an international perspective. Annu Rev Environ Resour 35:77–108\n\n Article  Google Scholar \n\n 11. 11.\n\n Winzer C (2012) Conceptualizing energy security. Energ Policy 46:36–48\n\n Article  Google Scholar \n\n 12. 12.\n\n Early BR et al (2016) Global governance at the energy-security nexus: lessons from UNSCR 1540. Energy Res Soc Sci 24:94–101.\n\n Article  Google Scholar \n\n 13. 13.\n\n Krupa J, Jones C (2013) Black swan theory: applications to energy market histories and technologies. Energy Strategy Rev 1(4):286–290.\n\n Article  Google Scholar \n\n 14. 14.\n\n Barbosa LS, Bogdanov D, Vainikka P, Breyer C (2017) Hydro, wind and solar power as a base for a 100% renewable energy supply for south and central America. PLoS One 12(3):e0173820.\n\n Article  Google Scholar \n\n 15. 15.\n\n Bogdanov D, Breyer C (2016) North-east Asian super grid for 100% renewable energy supply: optimal mix of energy Technologies for Electricity, gas and heat supply options. Energ Convers Manage 112:176–190.\n\n Article  Google Scholar \n\n 16. 16.\n\n O'Sullivan M, Overland I, Sandalow D (2017) The Geopolitics of Renewable Energy. HKS Faculty Research Working Paper Series RWP17–027, June 2017. Accessed 31 Jul 2017\n\n 17. 17.\n\n Paltsev S (2016) The complicated geopolitics of renewable energy. Bull At Sci 72(6):390–395.\n\n Article  Google Scholar \n\n 18. 18.\n\n Scholten D, Bosman R (2016) The geopolitics of renewable; exploring the political implications of renwable energy systems. Technol Forecast Soc Chang 103:273–283\n\n Article  Google Scholar \n\n 19. 19.\n\n Child M, Breyer C (2017) Transition and transformation: a review of the concept of change in the progress towards future sustainable energy systems. Energ Policy 107:11–26.\n\n Article  Google Scholar \n\n 20. 20.\n\n Grubler A (2012) Energy transitions research: insights and cautionary tales. Energ Policy 50:8–16.\n\n Article  Google Scholar \n\n 21. 21.\n\n Scoones I, Leach M, Newell P (eds) (2015) The politics of green transformations. Routledge, London / New York\n\n Google Scholar \n\n 22. 22.\n\n Maier HR, Guillaume JHA, van Delden H, Riddell GA, Haasnoot M, Kwakkel JH (2016) An uncertain future, deep uncertainty, scenarios, robustness and adaptation: how do they fit together? Environ Model Softw 81:154–164.\n\n Article  Google Scholar \n\n 23. 23.\n\n Hughes L, de Jong M, Wang XQ (2016) A generic method for analyzing the risks to energy systems. Appl Energy 180:895–908.\n\n Article  Google Scholar \n\n 24. 24.\n\n\n Google Scholar \n\n 25. 25.\n\n Colonomos A (2016) Selling the future. The perils of predicting the global politics. Hurst & Company, London\n\n Google Scholar \n\n 26. 26.\n\n Schwartz SH, Bardi A (2003) Values and behavior: strength and structure of relations. Personal Soc Psychol Bull 29:1207–1220\n\n Article  Google Scholar \n\n 27. 27.\n\n Kurzweil R (2005) The singularity is near. When humans transcend biology. Penguin Books, London\n\n Google Scholar \n\n 28. 28.\n\n Scheffer M et al (2009) Early-warning signals for critical transitions. Nature 461:53–59\n\n Article  Google Scholar \n\n 29. 29.\n\n Rescher N (1998) Predicting the future. An introduction to the theory of forecasting. State University of NY Press, New York\n\n Google Scholar \n\n 30. 30.\n\n Hofman JM, Sharma A, Watts DJ (2017) Prediction and explanation in social systems. Science 355:486–488 Accessed 3 Febr 2017\n\n Article  Google Scholar \n\n 31. 31.\n\n Steinmüller K (2012) Wild Cards, Schwache Signale und Web-Seismographen. Vom Umgang der Zukunftsforschung mit dem Unvorhersagbaren. In: Koschnick WJ (ed) FOCUS-Jahrbuch 2012. Prognosen, Trend- und Zukunftsforschung, München, pp 215–240\n\n Google Scholar \n\n 32. 32.\n\n Grunwald A (2015) Die hermeneutische Erweiterung der Technikfolgenabschätzung. Technikfolgenabschätzung – Theorie und Praxis 2(24):65–69\n\n Google Scholar \n\n 33. 33.\n\n Tetlock P, Gardner D (2015) Superforecasting: the art and science of prediction. Crown. Publishers, New York\n\n Google Scholar \n\n 34. 34.\n\n Ritchey T (2010) Wicked problems - social messes. Decision support modelling with morphological analysis. Swedish Morphological Society, Stockholm\n\n Google Scholar \n\n 35. 35.\n\n Casti JL, Ilmola L, Rouvinen P, Wilenius M (2011) Extreme Events. Helsinki, Taloustieto Oy\n\n Google Scholar \n\n 36. 36.\n\n Casti JL (2012) X-events: the collapse of everything. HarperCollins, New York\n\n Google Scholar \n\n 37. 37.\n\n Taleb NN (2007) The black swan - the impact of the highly improbable. Penguin Books, London\n\n Google Scholar \n\n 38. 38.\n\n Petersen JL, Steinmüller K (2009) Wild cards. In: In: The millennium project (ed) futures research methodology V 3.0. The Millennium Project, Washington\n\n Google Scholar \n\n 39. 39.\n\n Steinmüller K (2008) Wild cards – preparing for the unpredictable. In: Ngoh ETH, Boon HT (eds) Thinking about the future. Strategic anticipation and RAHS. National Security Coordination Secretariat, Singapore, pp 81–93\n\n Google Scholar \n\n 40. 40.\n\n Heinonen S (2013) Dance of the black swans in: black swans – what will change the world next? Entries from the writing contest of the Committee for the Future of the parliament of Finland. Publish Ser Comm Future 5(2013):20–40\n\n Google Scholar \n\n 41. 41.\n\n Heinonen S, Ruotsalainen J (2011) Anticipation and interpretation of black swans as a learning process – lessons of a volcanic ash cloud. In: Auffermann B, Kaskinen J (eds) Security in futures – security in change. Proceedings of the conference “security in futures – security in change”, 3–4 June 2010, Turku, pp 180–190\n\n 42. 42.\n\n Petersen JL (1997) Out of the blue: wild cards and other big future surprises: how to anticipate and respond to profound change. Arlington Institute, Arlington\n\n Google Scholar \n\n 43. 43.\n\n van Rij V (2013) New emerging issues and wild cards as future shakers and shapers. In: Giaoutzi M, Sapio B (eds) Recent developments in foresight methodologies, Complex networks and dynamic systems, vol 1. Springer, Boston, pp 67–89\n\n Google Scholar \n\n 44. 44.\n\n Heinonen S (2017) Appendix 4: interview of Karlheinz Steinmüller, In: Heinonen S, Karjalainen J, Parkkinen M, Ruotsalainen J, Zavialova S (eds) Surprising energy futures. Neo-carbon energy futures Clinique V. FFRC eBOOK 4/2017, Finland futures research Centre, University of Turku, pp 93–97. Accessed 31 Jul 2017\n\n 45. 45.\n\n Casti JL (2017) Complexity, extreme events and human social progress. Futures of A Complex World Conference, 12 June 2017, Radisson Blu Marina Palace Hotel. Futures of A Complex World, Turku, Finland. Keynote speech\n\n 46. 46.\n\n Barber M (2006) Wildcards - signals from a future near you. J Futures Stud 11:75–93\n\n Google Scholar \n\n 47. 47.\n\n Boden TA, Andres RJ, Marland G (2016) Global, regional, and National Fossil-Fuel CO2 emissions. In Trends: A Compendium of Data on Global Change. Carbon Dioxide Information Analysis Center, Oak Ridge National Laboratory, US Department of Energy, Oak Ridge. Tenn., U.S.A. Accessed 31 Jul 2017\n\n 48. 48.\n\n OECD/IEA (2015) World Energy Outlook Special Report: Energy and Climate Change. International Energy Agency, Paris. Accessed 31 Jul 2017\n\n 49. 49.\n\n Heinberg R, Fridley D (2016) Our renewable future. Laying the path for one hundred percent clean energy. Island Press, Washington DC\n\n Google Scholar \n\n 50. 50.\n\n Ruotsalainen J, Karjalainen J, Child M, Heinonen S (2017) Culture, values, lifestyles, and power in energy futures: a critical peer-to-peer vision for renewable energy. Energy Res Soc Sci 34:231–239\n\n Article  Google Scholar \n\n 51. 51.\n\n REN21 (2017) Renewables Global Futures Report. Great Debates Towards 100% Renewable Energy. Accessed 31 Jul 2017\n\n 52. 52.\n\n Fraunhofer ISE (2015) Current and future cost of photovoltaics. Long-term Scenarios for Market Development, System Prices and LCOE of Utility-Scale PV systems. Accessed 31 Jul 2017\n\n 53. 53.\n\n Rifkin J (2014) The zero marginal cost society. The internet of things, the collaborative commons, and the eclipse of capitalism. Palgrave. MacMillan, New York\n\n Google Scholar \n\n 54. 54.\n\n Miller CA, Richter J, O’Leary J (2015) Socio-energy systems design: a policy framework for energy transitions. Energy Res Soc Sci 6:29–40\n\n Article  Google Scholar \n\n 55. 55.\n\n Korotayev A, Bilyuga S, Belalov I, Goldstone J (2017) Oil prices, socio-political destabilization risks, and future energy technologies. Technol Forecast Soc Chang, Article in Press doi:\n\n 56. 56.\n\n Diamond J (2005) Collapse: how societies choose to fail or succeed. Viking, New York\n\n Google Scholar \n\n 57. 57.\n\n Last C (2014) Global brain and the future of human society. World Future Rev 6(2):143–150\n\n Article  Google Scholar \n\n 58. 58.\n\n Sardar Z (2010) Welcome to postnormal times. Futures 42:435–444\n\n Article  Google Scholar \n\n 59. 59.\n\n Heylighen F (2014) Return to Eden? Promises and perils on the road to superintelligence. Accessed 20 Sept 2016\n\n 60. 60.\n\n Cilliers P, Nicolescu B (2012) Complexity and transdisciplinarity – discontinuity, levels of reality and the hidden third. Futures 44:711–718\n\n Article  Google Scholar \n\n 61. 61.\n\n Dubois A, Smith CJ (2010) The ´wild cards´ of European futures: planning for discontinuities? Futures 42:846–855\n\n Article  Google Scholar \n\n 62. 62.\n\n Hiltunen E, Heinonen S (2012) Creative foresight space and the futures window: using visual weak signals to enhance anticipation and innovation. Futures 44:248–256\n\n Article  Google Scholar \n\n 63. 63.\n\n Ansoff HI (1984) Implanting strategic management. Prentice-Hall International, London\n\n Google Scholar \n\n 64. 64.\n\n Kaivo-oja J (2012) Weak signals analysis, knowledge management theory and systemic socio-cultural transitions. Futures 44:206–217\n\n Article  Google Scholar \n\n 65. 65.\n\n Rossel P (2012) Early detection, warnings, weak signals and seeds of change: a turbulent domain of futures studies. Futures 44:229–239\n\n Article  Google Scholar \n\n 66. 66.\n\n Saritas O, Smith JE (2011) The big picture: trends, drivers, wild cards, discontinuities and weak signals. Futures 43(3):292–312\n\n Article  Google Scholar \n\n 67. 67.\n\n van Notten P, Sleegers A, van Asselt M (2005) The future shocks: on discontinuity and scenario development. Technol Forecast Soc Chang 72:175–194\n\n Article  Google Scholar \n\n 68. 68.\n\n Greenberg E, Hirt M, Smit S (2017) The global forces inspiring a new narrative of progress. McKinsey Quarterly, April 2017. Accessed 31 Jul 2017\n\n 69. 69.\n\n Drucker P (1968) The age of discontinuity. Harper and Row, New York\n\n Google Scholar \n\n 70. 70.\n\n Grossmann I (2007) Critical and strategic factors for scenario development and discontinuity tracing. Futures 39:878–894\n\n Article  Google Scholar \n\n 71. 71.\n\n Benkler Y (2006) The wealth of networks. How social production transforms markets and freedom. Yale University Press, London\n\n Google Scholar \n\n 72. 72.\n\n Heinonen S, Ruotsalainen J (2013) Futures Clinique − method for promoting futures learning and provoking radical futures. Eur J Futures Res 15:7.\n\n Article  Google Scholar \n\n 73. 73.\n\n Gordon T (2016) 1,000 futures: testing resiliency using plausible future headlines. World Futures Rev 8(2):75–86\n\n Article  Google Scholar \n\n 74. 74.\n\n Gordon T (2009) Cross-impact analysis. In: Futures research methodology v 3.0. The millennium project cd, Washington DC\n\n 75. 75.\n\n Annarelli A, Nonino F (2016) Strategic and operational management of organizational resilience: current state of research and future directions. Omega 62:1–18.\n\n Article  Google Scholar \n\n 76. 76.\n\n Kuusi O, Cuhls K, Steinmüller K (2015) Futures map and its quality criteria. Eur J futures res 3(22):1−14. doi:\n\n 77. 77.\n\n Erker S, Stangl R, Stoeglehner G (2017) Resilience in the light of energy crises – part I: a framework to conceptualise regional energy resilience. J Clean Prod 164:420–433.\n\n Article  Google Scholar \n\n 78. 78.\n\n Bildosola I, Río-Bélver RM, Garechana G, Cilleruelo E (2017) TeknoRoadmap, an approach for depicting emerging technologies. Technol Forecast Soc Chang 117:25–37.\n\n Article  Google Scholar \n\n 79. 79.\n\n Heinonen S, Karjalainen J, Ruotsalainen, J (2016) Radical Transformation in a Distributed Society – Neo-Carbon Energy Scenarios 2050. Neo-carbon energy WP1 Working Paper 1/2016, Finland Futures Research Centre, Turku. Accessed 3 Febr 2017\n\n 80. 80.\n\n OECD (ed) (2011) Future global shocks. Improving Risk Governance, Organisation for Economic Co-operation and Development, Paris\n\n Google Scholar \n\n 81. 81.\n\n Pamlin D, Armstrong S (2015) Global challenges 12: risks that threaten human civilisation. Global Challenges Foundation, Stockholm\n\n Google Scholar \n\n 82. 82.\n\n Ravetz J, Miles I, Popper R (2011) ERA toolkit: applications of wild cards and weak signals to the grand challenges and thematic priorities of the European research area. Manchester Institute of Innovation Research, Manchester\n\n Google Scholar \n\nDownload references\n\nPublisher’s Note\n\n\nAuthor information\n\n\n\nCorresponding author\n\nCorrespondence to Sirkka Heinonen.\n\nRights and permissions\n\n\nReprints and Permissions\n\nAbout this article\n\nVerify currency and authenticity via CrossMark\n\nCite this article\n\nHeinonen, S., Karjalainen, J., Ruotsalainen, J. et al. Surprise as the new normal – implications for energy security. Eur J Futures Res 5, 12 (2017).\n\nDownload citation\n\n\n • Renewable energy\n • Transformative scenarios\n • Energy security\n • Resilience\n • Complexity\n • Wild cards\n • Black swans\n • Uncertainty\n • Discontinuity\n • Turbulence", "pred_label": "__label__1", "pred_score_pos": 0.6982057094573975} {"content": "How does a Judge Make Child Custody Decisions in Illinois?\n\nHow does a Judge Make Child Custody Decisions in Illinois?\n\nThe state of Illinois is slightly different than many other states, in that joint custody is not presumed. Custody decisions in the state of Illinois are made by a judge who bases the decision on the child’s best interest, while attempting to maximize the involvement by each parent or guardian.\n\nDuring a divorce involving children, often one of the most difficult and contentious parts of the process is determining custody of a child. A common assumption is that mothers have an advantage and will be typically given custody. Though the system once may have worked this way decades ago, the court operates much different today. The interest of the court is to determine what is in the best interest of the child.\n\nThere are two different types of custody of a child in the state of Illinois. The first is legal custody. This type of custody gives a parent the authority to decide certain matters of a child’s life such as: where they will receive education, what medical treatment they will receive, and what religion (if any) they will practice. The second type of custody is called residential custody. This type of custody determines where a child will live for a majority of the time and for the other parent, who has the obligation of paying child support.\n\n\nWhat is the Difference Between ‘Custody’ and ‘Visitation’?\n\nAlthough ‘custody’ and ‘visitation’ are often used interchangeably, there is distinct different between the two terms. Custody refers to the parent that has the right to make decisions for the child. Custody of the child will include both legal and physical custody, which are defined in the paragraph above. The parent with custody of the child will be the parent who bears the most responsibility for the day-to-day and long-term decisions for the child. The parent who is granted custody is most often granted the right to have the child live with them as well.\n\nVisitation refers to the time the other parent spends with the child. A visitation plan is usually created by the court, or the parties if they are able to agree. In situations where a Judge makes the custody and visitation decision, the decision will be based off what the child’s best interests are.  Generally, a parenting agreement describes the specific custody and visitation arrangement.\n\n\nWhat are the Steps to Determining Custody?\n\nThe first step taken is to file a Petition for Allocation of Parental responsibilities within 120 days of service. Once this is done, both parents then submit a proposed “parenting plan”. If the parents are able to agree on a parenting plan, the court will in most cases adopt this plan. Very rarely will the court intervein and order something different. In these cases, the court has determined that the plan both parents have agreed upon, despite being chosen by both parents, is not in the best interests of the child and will explain its reasoning.\n\nIn the event that two parents cannot agree to a parenting plan, the court will order them to participate in mediation to attempt to come to an agreement. The court could order the costs to be waived, but typically the cost of the mediation is split between the parents.\n\nIf the parents are still not able to agree on a parenting plan after mediation, the court will set a date for a hearing or trial. At this hearing or trial, the court considers the parenting plan of each parent and creates one plan in the best interest of the child.\n\n\nWhat is in a ‘Parenting Plan’?\n\nThe largest parts of a parenting plan are made up of scheduling the parenting time (the time a child spends with a parent) and allocation of significant decision-making responsibilities.\n\nSome information is required such as:\n\n • - designation of authority to one or both parents as to the decision making for the child’s education, healthcare, religion, and any extra-curricular activities the child may be involved in\n • - each parent’s right of access to the child's medical and school records\n • - designation of a parent to receive tax benefits for the child\n • - designation of a parent’s address for education enrollment purposes\n • - each parent's residence address, phone number and place of employment\n • - notice requirement of sixty (60) days in the event one of the parents moves\n • - transportation arrangements for the child\n • - notice requirement in the event of any emergency, healthcare, or travel involving the child\n • - agreed arrangements for transporting the child between the parents\n • - arrangements for one parent to be able to communicate with the child during the other parent's parenting time\n • - agreement for resolving issues in the event a parent relocates\n • - provisions for future modifications of the parenting plan, if specified events occur\n\nThere are two options when designating parenting time. The first is a schedule that designates which of the parent’s home the minor child will reside in on given days or a method for determining such a schedule with enough detail that it could be enforced in a subsequent proceeding.\n\n\nHow Does a Judge Determine my Child’s Best Interests?\n\nIllinois’s courts have adopted the Uniform Child Custody Act (UCCA) which was implemented as a way to minimize conflicts among guardians, while placing an important emphasis on the best interest of the child. When making this decision, a judge will take many factors into consideration. These factors typically include:\n\n • - the child’s wishes\n • - the financial stability of each guardian\n • - the guardians’ wishes\n • - each guardian’s mental health\n • - any history of domestic violence or threat of domestic violence directed at the child or other guardian\n • - any history of alcohol or drug abuse\n • - the child’s relationship with each guardian\n • - whether the child has other siblings and who those siblings live with\n • - which guardian handles the daily parenting tasks such as bathing, cooking, transportation etc.\n\n\nChild custody cases are often emotionally difficult and can be in intense process. It is important to speak with an experienced family law attorney before making any decision in a custody battle. Sean Robertson can be reached at 630-780-1034 or via email at\n\nHelpful? Share with others.", "pred_label": "__label__1", "pred_score_pos": 0.7789221405982971} {"content": "How do you combine multiple video streams from your event?\n\nThe title of this post is a hint at the rest of the story below. Imagine attending or organizing an event (kids athletic event, performance, conference, party, reception, speech, etc.) that is not \"professionally\" captured on video. However, there are several individuals capturing the event on various video devices from … Keep reading >>>", "pred_label": "__label__1", "pred_score_pos": 0.9992121458053589} {"content": "Faculty Pub Night with Jason Jarvis: What You Missed\n\nThis post was written by library student assistant, Carmen Venegas. Carmen is a senior communications studies major with a music minor. She was born and raised in the Bay Area, California. She has an interest in grassroots marketing, community advocacy, and ethical usage of social media.\n\nOn November 10, our Faculty Pub Night featured Dr. Jason Jarvis, assistant professor of rhetoric and media in the Communication Studies Department. Jarvis discussed his forthcoming publication, Greenwashing: Visual Politics of Oil in Southern California. Jarvis received his PhD from Georgia State University and his research is centered around the visual politics of images and environmental media in relation to digital culture. He focuses on social media’s ability to influence our perceptions of the world and human behavior. His research is also the focus of an emerging journalism course at LMU called “Immersed in Urban Oil,” which will be co-taught by Jarvis and Tara-Lynn Pixley in the spring of 2021.\n\nJarvis began with prompting the audience to take count of all of the items made from oil surrounding them. He then explained that the number is a lot higher than we often think. In fact, petroleum products are central to our lives. Jarvis showed a graphic that exemplified the fact that petroleum is in everything from our cosmetic products to our dishware. He expressed that we are all extremely immersed in a petroculture. Jarvis further explained, “Even if we all decided to switch to electric cars, we’re still going to be wrapped up in oil.”\n\nNext, Jarvis explained that there is something strange and unique happening in Los Angeles in relation to petroculture. The first major oil field in LA County was founded in 1880 in Brea-Olinda and is still active today. Now, there are a total of 28 oil fields and 7 refineries in the Los Angeles basin. Jarvis expressed that the Playa del Rey field is closest to LMU; Playa Vista and the Ballona wetlands are on an oil field. Jarvis said, “It is undoubtedly the case that there were LMU graduates up to the 1960s who could stand on the bluff and look longingly out over the ocean and watch oil being pumped every day.”\n\nAnother chilling fact Jarvis shared is that oil fields tend to follow the fault lines due to the abundance of oil near them. There is in fact credible research that this is one of the reasons that southern California is so seismically active. Jarvis continued to explain that 4 out of 5 of the largest earthquakes in LA were caused by oil drilling. He said that we should especially care about this as it pertains to us and where we live.\n\nIn truth, the history of oil in LA is hidden from the public. Jarvis explained this through the origin of Beverly Hills. In 1906, Charlie Canfield bought land hoping to find oil, but was unsuccessful because he did not drill deep enough. The land was then turned into residential plots and sold as Beverly Hills. However in 1908, oil was discovered. And by the 1950s, there were 52 active oil wells that were hidden with plants on the Fox Studio grounds. Jarvis further explained that even now the Beverly Hills mall is on oil grounds.  Moreover, Beverly Hills High School was built on abandoned oil wells, and in the 1950s, drilling was actually permitted at the school; In total, 19 wells were operated there. Due to this, royalties reached $1.5 million a year in the 1970s. Jarvis continued to say that many students and faculty got sick and some even died due to the high rates of cancer. Eventually the company that bought the wells invited children from the local cancer ward at the hospital to paint an extremely visible well. They called it the “Tower of Hope” in an effort to make the derrick look more “child-friendly,” as Jarvis put it. The irony of this was exposed when a large thyroid cancer cluster was discovered at the high school because the pipes were checked for leaks with radioactive iodine and exposure to such radiation directly causes this specific type of cancer.\n\nThe “Tower of Hope” is unfortunately just one example of camouflaged wells. Jarvis pointed out that there are wells disguised as office buildings and islands in Long Beach. There are also methane vents that look like street lights in Playa Vista, mainly near playgrounds, and their purpose is to make sure there is not too much build up of chemicals.\n\nFor the second half of Jarvis’ presentation, he discussed the importance of social media in regard to oil drilling in Los Angeles. Jarvis began this segment with the question, “How did we get to a place where the most densely populated county in the United States is also the home to some of the most extensive urban oil fields on the planet?” He continued to answer this by analyzing how social media has been utilized by oil companies. He looked to postcards as early social media, which were widely popular among the wealthy and social elites. It was common for people to have displayed collections, but mailed cards were considered more valuable. Due to the social popularity amidst postcard distribution, they were also the focus of social fears and upheaval as they were ways for people to communicate about issues such as gender, race, and colonialism.\n\nNext Jarvis introduced the term greenwashing which he defined as a deceptive PR tactic. Greenwashing is defined as “an attempt to promote the appearance of products and commodity consumption as environmental or ‘green’ while deliberately disavowing environmental impacts” (Pezullo and Cox, 2018). A tremendously helpful resource for Jarvis’s research was the Werner von Boltenstern Postcard Collection offered through the library’s Archives and Special Collections. Through this collection, Jarvis showed many postcards that attempted to greenwash oil infrastructure and naturalize it as a non-threatening part of the landscape in an effort to make drilling seem organic and normal. These postcards consisted of beautiful scenes portraying oil wells among nature and neighborhoods, despite the damage they actually do to the environment and the health of the people surrounding them.\n\nJarvis’ closing statement and thesis spoke volumes: “California: Greenwashed, but not as ‘green’ as we’d like it to be.”", "pred_label": "__label__1", "pred_score_pos": 0.5382764339447021} {"content": "Talk by Dr. Maryam Bahramipanah (Electrical & Computer Engineering Department, MSU)\n\n1/31/2019   Wilson Hall 1-144   3:10-4:00pm\n\n\nIn the last decades, the massive connection of Distributed Generations (DGs) triggers different operation challenges in Active Distribution Networks (ADNs). Thus, the issue of real-time control of ADNs became more challenging caused by the lack of direct control over stochastic and non-stochastic DGs. In this talk, a real-time decentralized control algorithm in multi-area ADNs relying only on dispersed Battery Energy Storage Systems (BESSs) will be addressed. Firstly, a detailed dynamic model for BESSs accounting for charge redistribution effects will be presented. Then, a zonal control strategy targeting voltage support and line congestion management will be addressed. The presented zonal control relies on the accurate dynamic model of BESSs and it is capable to account for their DC active power limits. The communication among different areas is defined using the concept of multi-agents. The goal is to show that in order to have a feasible voltage and current profile for battery devices, the control algorithm needs to include their detailed dynamic model.", "pred_label": "__label__1", "pred_score_pos": 0.8333984613418579} {"content": "How Much Does It Cost To Get A CCW In California?\n\n\n\nWhat disqualifies you from owning a gun in California?\n\nCalifornia’s firearms laws are strict and federal laws are even stricter. If you are convicted of a felony or certain misdemeanors, you will lose your right to possess a gun in California. You also may not own or possess a gun if you are: … prohibited by federal law from possessing a gun.\n\nIs it hard to get a gun permit in California?\n\nUnder current California law, it is incredibly difficult to obtain a license to carry a hidden gun in a public place. … An applicant also has to demonstrate “good moral character,” which law enforcement has lots of leeway to determine.\n\nDo you have to tell police you have a gun in the car in California?\n\nFirst of all, if you are pulled over, you must be honest and upfront with the officer about the presence of any firearm in your vehicle. If have a concealed carry permit, you must disclose that you have a gun on your person or in your vehicle.\n\nCan I carry a gun while hiking in California?\n\n(a) No person shall carry, possess or discharge across, in or into any portion of any unit any weapon, firearm, spear, bow and arrow, trap, net, or device capable of injuring, or killing any person or animal, or capturing any animal, or damaging any public or private property, except in underwater parks or designated …\n\nHollow-Point-Bullet Ban and Gun Lock Box Law. San Francisco has won a legal victory in a federal appeals court over two ordinances that require handgun owners to lock up their weapons and ban the sale of hollow-point bullets. … Ikuta also wrote that “firearm injuries are the third-leading cause of death in San Francisco. …\n\nWhat guns are banned in California?\n\nAssault weapons and BMG rifles are also banned in California per Penal Code 30600 PC….Some of these include:short-barreled shotguns and rifles, also illegal per Penal Code 33215 PC,undetectable firearms, also illegal per Penal Code 24610 PC, guns, also illegal per Penal Code 33600 PC.\n\nWhere do I apply for a CCW in California?\n\nTo apply, contact your county sheriff. You’ll have to fill out an application and complete a firearms safety course. Depending on your county, you may also have to undergo psychological testing. If you already have a CCW license from another state, you must apply for a California CCW license.\n\nCan you have a loaded gun in your house in California?\n\nCalifornia makes it a crime to keep a loaded gun somewhere on your property (or property you control) if you know or should know that a minor (under age 18) is likely to get access to it without parental permission.\n\nCan I apply for a gun license online in California?\n\nConvenience– The online application eliminates the need to mail an application and/or forms to the DOJ and saves time. You have the ability to apply, renew or modify your COE as well as report any change in employment with a firearms dealer or ammunition vendor through the online application.\n\nCan I carry an unloaded gun in my backpack in California?\n\nAn unloaded firearm sitting on the floor of a locked trunk is completely legal. Yes, you can carry a locked and unloaded gun in your backpack with a loaded mag in the same case or not. You could even use one of those calendar/reminder books if you wanted (locked). You can not use your glove box as a locking container.\n\nWhat is considered good cause for CCW in CA?\n\nState law allows for a person to be issued a concealed carry permit if: You are of good moral character; Good cause exists for issuance of the license because you or a member of your family is in immediate danger; You meet certain residency requirements; and.\n\nCan I get concealed carry in California?\n\nCalifornia generally prohibits a person from carrying a loaded, concealed firearm in public unless the person has been issued a concealed weapons license. … California is a “may-issue” state, meaning that local law enforcement has discretion when issuing carrying concealed weapons (“CCW”) licenses.\n\nHow many guns can you carry with a CCW in California?\n\nthree gunsMost counties allow up to three guns on the permit.\n\n\nCalifornia law requires any prospective purchaser (or other transferee) of a firearm to submit an application to purchase the firearm (also known as a “Dealer Record of Sale” or “DROS” form) through a licensed dealer to DOJ. …", "pred_label": "__label__1", "pred_score_pos": 0.8312398195266724} {"content": "Being and Time\n\nBeing and Time are maybe two of the most enigmatic concepts in human history. I had seen these two words side by side on a book when I was at high school. The author was Martin Heidegger, “the greatest philosopher” of the 20th century, or even of the “whole” Western thought after Plato and Aristotle according to the introduction. I was struck by these claims, and had borrowed one Turkish translation of the book from our library. However, I couldn’t understand anything. I still remember the disappointment with the book and with myself. Then in a philosophy class last semester, I encountered Heidegger again. This time, in the waters of a different language, I was somewhat able to understand him! And I want to share his understanding of time in this blog post, as much as I understood it and as best as I can.\n\nAs we see from the title, time and being are very intertwined concepts in Heidegger’s view. But before delving into time in his thought, I will try to explain briefly his philosophy.\n\nHeidegger’s main question was “What is it to be?”. He was specialized in ontology as well as phenomenology, and he argued that the question above wasn’t asked or thought properly for a long time in the Western thought.\n\nIn his view, Being, for humans, is first of all “being in the world”. Secondly, it is “making sense of things”. In other words, the context, history, discourses, experiences that we live in/with are very crucial elements in our incessant process of making sense of things in the world. Humans are “thrown” into this world, and they gradually, by always using references, interpret things. Another crucial factor that affects our hermeneutical journey is our states of mind. Our state of mind, i.e. mood, is the “primary way in which we feel the significance of sense making”. Death is the opposite of being in his philosophy whereby our interpretive journey ends and nullity begins.\n\nTime, in his system, is a characteristic of human being. It occurs only with the human being; it is the primary determinant of our existence. Time is the ground of our interpretive journey where things are present to us and we are embedded in meaning making process. Time is the interface between human being and things where disclosure, openness or unclosedness of things happen. In this respect, it is quite subjective, personal and relative. Past, present and future are all in our minds, and we go back and forth between them. He doesn’t deny the “clock time” which he calls “ordinary time”. But he points out its relativity, and focuses on mostly the aforementioned human temporality where making sense of things happen in our finite lives. In this sense, he reminds me of St.Augustin who had argued also the centrality of present and human experience regarding time. Heidegger’s understanding of time is also close to Bergson’s duration concept where the human experience of time is very subjective.", "pred_label": "__label__1", "pred_score_pos": 0.9966365098953247} {"content": "Question: Do You Have To Prime A Canvas For Acrylic Paint?\n\nHow do you prime a canvas for acrylic paint?\n\nA top layer of gesso diluted thinly with water and acrylic gloss medium will help create a smooth painting surface.\n\nGesso can also be used to prime hardboard or paper, both of which make good supports on which to paint with oil and acrylic..\n\nWhat happens if you don’t use gesso?\n\n\nIs gesso really necessary?\n\n\nCan I use white acrylic paint instead of gesso?\n\n\nWhat type of canvas is best for acrylic paint?\n\n\nCan I use Mod Podge instead of gesso?\n\n\nIs gesso and primer the same?\n\nGesso, pronounced ‘jesso’, was traditionally used to prepare or prime a surface so Oil paint would adhere to it. Gesso is the same as a primer, as in ‘pre-primed canvas’. It is made from a combination of paint pigment, chalk and binder.\n\nCan you prime a canvas with white acrylic paint?\n\nPriming is the process of creating a barrier between the canvas and the paint of a painting. Typically this is done by applying layers of acrylic gesso, clear acrylic medium, or traditional hyde glue and oil priming white. … Gesso serves as a waterproof surface that allows your paint to spread evenly across the canvas.\n\nWhat happens if you don’t prime a canvas?\n\nAnd yes, you HAVE to use Gesso here. Ordinary white paint doesn’t have the same properties or texture that Gesso has. Priming also makes the canvas easier to paint on. … The Gesso layer will protect them from deteriorating, which can happen when working directly on the canvas.\n\nHow do you prep a canvas for acrylic paint without gesso?\n\n\nShould you wet your canvas before painting?\n\n\nWhy won’t my acrylic paint stick to the canvas?\n\nThen there comes another issue; as you know, acrylic paint consists of pigments that are suspended in a binder. If you very much dilute the acrylic paint with water, then it weakens the binder, and paint does not stick to the canvas properly and can be lift off from the surface any time.\n\nCan I use white paint as a primer?\n\n\nDo you have to prime a canvas before using acrylic paint?\n", "pred_label": "__label__1", "pred_score_pos": 0.9571439027786255} {"content": "Question: What Are Literary Terms Examples?\n\nWhat is a literary term?\n\n\nLiterary terms have a wide range of application, from the poet’s beauty, to the speaker’s persuasion, to the novelist’s story development..\n\nWhat are 5 literary terms?\n\nWhile hundreds of literary devices have been created, some of the most common are:Allusion.Diction.Epigraph.Euphemism.Foreshadowing.Imagery.Metaphor/Simile.Personification.More items…•\n\nWhat are the 20 literary devices?\n\n20 Top Poetic Devices to RememberAllegory. An allegory is a story, poem, or other written work that can be interpreted to have a secondary meaning. … Alliteration. Alliteration is the repetition of a sound or letter at the beginning of multiple words in a series. … Apostrophe. … Assonance. … Blank Verse. … Consonance. … Enjambment. … Meter.More items…•\n\nIs irony a literary term?\n\n\nWhat is an example of literary?\n\nLiterary Techniques, on the contrary, are structures usually a word s or phrases in literary texts that writers employ to achieve not merely artistic ends but also readers a greater understanding and appreciation of their literary works. Examples are: metaphor, simile, alliteration, hyperbole, allegory etc.\n\nWhat are the 7 literary elements?\n\n\nWhat literary devices does Shakespeare use?\n\nShakespeare uses three main techniques, or literary devices, in Macbeth: irony, imagery, and symbolism.\n\nWhat is a literary sentence?\n\n\nHow do you use literary devices?\n\nTips and Tricks: Using Literary Devices to Enhance Your StorytellingAlliteration. Alliteration is using a sequence of words with the same initial sound. … Irony. Irony lies in a difference between what is expected and what actually occurs. … Metaphor. … Personification. … Simile. … Hyperbole. … Powerful Tools.\n\nIs sarcasm a literary technique?\n\nSarcasm is a literary device that uses irony to mock someone or something or convey contempt. Sarcasm can also be defined as the use of words that mean the opposite of what the speaker or writer intends, especially to insult or show irritation with someone, or to amuse others.\n\nWhat are the 10 literary terms?\n\nHere are 10 of the most common literary devices:Simile.Metaphor.Imagery.Symbolism.Flashbacks.Foreshadowing.Motif.Allegory.More items…•\n\nWhat is a device in writing?\n\nA literary device is a tool used by writers to hint at larger themes, ideas, and meaning in a story or piece of writing. There are many styles of literary devices, each serving a different purpose. Some operate at the sentence level, while others serve the piece of writing as a whole.\n\nWhat literary device is a saying?\n\nDefinition: An aphorism is a concise statement that is made in a matter of fact tone to state a principle or an opinion that is generally understood to be a universal truth. Aphorisms are often adages, wise sayings and maxims aimed at imparting sense and wisdom.\n\nHow do you identify a literary device in a poem?\n\nObjectivesIdentify six poetic devices: alliteration, metaphor, onomatopoeia, personification, rhyme, and simile.Determine the purpose of poetic devices as either emphasizing meaning or the sound of words.Respond to a journal entry.Transfer learning while becoming the “teacher” of an assigned poetic device.\n\nWhat are literary devices and examples?\n\nLiterary devices are various elements and techniques used in writing that construct the whole of your literature to create an intended perception of the writing for the reader. You probably remember learning about literary devices like personification, foreshadowing, and metaphors in school.\n\nIs there a literary language?\n\nA literary language is the form of a language used in its literary writing. It can be either a non-standard dialect or standardized variety of the language. Where there is a strong divergence between a written form and the spoken vernacular, the language is said to exhibit diglossia. …\n\nWhat literary device is used in this sentence?\n", "pred_label": "__label__1", "pred_score_pos": 0.9999650120735168} {"content": "Story of Suspense: Adapting Witness for Prosecution in an interactive medium\n\nGroup Eight\n\nWe all love Agatha Christie’s Witness for Prosecution. While it has any graphic scenes of violence, the chill down the spine after exploring the twisty, well-conceived plot will not likely be cast away shortly in our memories. Thus, we are interested in improving the story’s plots, especially in making them more interactive.\n\nConsidering all the alternatives, we decided to remediate the story into a text-based video game using Twine. As a story belonging to the detective genre, Witness for Prosecution places greater emphasis on a persistent plot rather than “slowing down” to provide the readers a close-up of specific scenes. In other words, progression plays a great part in the detective story. A text-based game is thus most suitable since it has greater focus on the procedural aspects of the gaming experience. Furthermore, it retains some level of fidelity, and even achieves some sort of homage, to the original work, since its main medium is still textual.\n\nWhile the original story can be roughly divided into three scenes, we decide to focus on the scene where the lawyer meets the “old woman”, which is the climax of the story. Many aspects of the scene provide an atmosphere of suspense. Taking place in a poor neighborhood where the lawyer would generally not frequent, it gives an unusual setting, conveying the unsettledness the lawyer would feel in an unfamiliar atmosphere. The woman’s peculiar language and erratic behaviors also add to the suspense, as we are made to wonder why she would do such things. Since we do not have a lot of time, we focus on it to yield a quality we would be most satisfied with. We also set the lawyer to be the playable character. In an ideal condition, we would like to remediate all three scenes of the story and have both the lawyer and the woman as playable characters.\n\nFirst, we identify the main “conflict” in the story to be between the lawyer and the woman. The woman, marking herself in disguise as a much older woman, tries to make the lawyer accept the forged evidence she provides. The lawyer, on the other hand, is obsessed with finding the “truth” behind his client (the suspect), so that he can rest the case well. We remediate such conflicts in our rules. Clues possible to debunk the woman’s lies are hidden in the game, and the player should try the best in discovering as many of them as possible. When the player discovers a clue, a message—starting with “Evidence Received”—would notify such a partial success. With enough evidence, the player can unlock either a good end (clues gathered to show the woman is lying) or a bad end (fooled by the woman’s plots).\n\nOur original draft sticks mostly to the original plot of the story. However, the original story does not give much “clues” to imply how the woman is lying, so we have to take a bit of creative license. A specific clue we considered was in the style of handwriting. We looked into how, according to the writer’s personal preferences, some letters could still look similar despite attempts of forgery. In general, we expand the number of clues by creating more small details the player can pick up. The player can choose to examine the bed, table, and some of the woman’s personal belongings.\n\nBesides focusing on diversifying the clues, we have also enriched the plots to provide much more options than the story’s linear narrative. Freedom of choice is something we try to strengthen in the gameplay’s rules. Particularly, we give the player the possibilities of saying different things. For example, when inquiring from the housekeeper where the old woman lives, the player could choose to be either nice or rude to the housekeeper (the former earns the player one of the clues). The ending is also no longer a binary opposition of finding or not finding enough evidence, but more complex scenarios besides whether the lawyer succeeds/fails in his job. For example, the lawyer could gather enough clues but still receive a “bad ending” if he chooses to ignore them with a guilty conscience or his sympathy for the woman. In such ways, we used creative means to expand the linear narratives of the original story with many branches of possibilities.\n\nOur work goes beyond the textual form. A lot of descriptions covering the lawyer’s thoughts were given in our original plan, but they—being words in large stanzas—lack the nervous immediacy the lawyer would likely feel. To make the player feel more immersed in the game, we look into adapting hypermediacy, finding many pictures to complement the story’s background. While words require the intensive workings of your own imaginations, images give the player a much more direct sense of the surroundings. For us modern people, it might be a bit difficult to imagine the decrepit neighborhoods in a 19th Century London, but the pictures convey such historical scenes in a clear fashion. Furthermore, we apply filters to some of the photos, making their overall tones suitable for conveying a variety of emotions. We have also looked into giving the game background music for different scenes, so that they subtly convey what the lawyer feels in such situations.\n\nWe learned the process of remediating a literary artwork to the platform of a computer form in this project. We not only familiarized ourselves with software available to make a game (Trello), but also paid a lot of attention to the process of remediation between artistic platforms. Most importantly, we enjoy the possibility of expanding and adapting the story’s thrilling plots to a new media. If we were to continue on and create a full game, we would not only remediate the whole story, but also allow players to play from multiple perspectives. For example, once you complete Mr. Mayherne’s storyline and unlock the right ending, you can play as Leonard Vole and try to get away with murder. Additionally, you could play as Romaine and try to pull off the disguise. Other than more endings and choices, we also would create more detailed evidence, such as designing handwriting for each character. However, overall we are proud of how we were able to turn “Witness for the Prosecution” into an interactive game and enjoyed the process.\n\nFinally, this is a link to the html file which houses Group 8’s game. To view the game, just copy and paste this link into your browser: \n\nThe link to the Trailer:\n\n\nProgramming and digital work: Elizabeth\n\nStory script: Avery, Jack, Qingyang, Zhixian\n\nFinding Photos/Music: Avery, Jack, Qingyang, Richard\n\nDocument: Avery , Zhixian\n\nTrailer: Richard\n\nOzymandias Remediated\n\nGame Design Document: Ozymandias\n\n         Creating something new is one of the great abilities of mankind. Stories of creation are some of the oldest known to man, as they can even be traced back to the Old Testament. These stories of creation have long captured our imagination, and authors have realized this for generations. From Pygmalion, in Ovid’s Metamorphoses, to Shelly’s Frankenstein, people have always been enthralled by the idea of something new being made, and the consequences of such creation. However, with creation comes the consequential and often disappointing understanding that nothing built by man can last forever. The great human desire to create magnificent things, coupled with the knowledge that those inspiring creations will ultimately crumble caught the attention of our group. Thus, we turned to the poem Ozymandias by Percy Shelly. This poem highlights the finite window of human creation and importance, and our group knew that it was the piece we wanted to recreate.\n\n         The goal of our project was to remediate the poem into a first-person controlled video game environment. The first question we had to ask ourselves was what we wanted our project to encompass. We decided that we wanted to create a desert landscape with the ruins of Ozymandias laying strewn across the overworld. The other aspect that we decided on very quickly was that the centerpiece of our game was going to be a puzzle. Just as poems need to be taken apart and solved in a sense, so does a puzzle. Only when all of the pieces are seen together as a whole does one fully understand the purpose of either the poem or the puzzle.\n\nOnce these preliminary decisions were made, the tasks had to be split up between group members. Luckily for our group, we had a variety of skill sets. This allowed us to divvy up the tasks to those who would do them best and most efficiently. Creating and coding the game, writing the game design document, and making the trailer/review video became our main tasks. So we started working, and here is what became of it.\n\nChoosing what we would create\n\nWhen starting to create the game itself we needed to decide as a group what we wanted the end project to look like. The basic idea was to create a desert landscape with ruins of a great statue and other structures strewn across the visual plain. This sort of grand setting filled with the remains of an older world was the type of aesthetic our group was looking for. Once this was decided we realized that there were two different scenes we needed to create: the desert landscape and the puzzle itself.\n\nThe desert was easy to decide on because it is laid out plainly in the poem, “the lone and level sands stretch far away.” Having exact imagery to base our project off of made things a bit easier in terms of decision making. This wording allowed for us to decide on a simple flat landscape for our project. The textures would be made to look like sand so as to imitate our desired desert landscape. In the far background the sand appears to slope upwards to give the feeling of being in a real desert, with the end of your field of view blending into the sky to create a realistic feeling horizon. This expansive and empty feeling is taken from the line “boundless and bare” as it should feel like there may be no end to the desolate land around them. You are alone in this destroyed and empty land which should help elicit a similar feeling to the one you gain from reading the original piece.\n\nAfter deciding on our setting, the first object was chosen. “Two vast and trunkless legs of stone/Stand in the desert” is the first mention of physical structures in the poem. As it is the first thing the traveller talks about in the poem, we knew that the scale of these legs needed to be very large compared to everything else in our scene so that they stood out immediately to the player when they entered the game. In the poem itself Ozymandias says he is “King of Kings”. This is quite a bold statement, and signifies that the setting that we were going to create needed to be grand and on a very large scale. For this reason, our group decided to use a model of the statue of King Ramses II to depict what a statue of Ozymandias might have looked like for real. King Ramses II, along with many past leaders of great empires, loved grandiose creations, especially those created for him and in his image. \n\nAlong with these “trunks” of King Ramses, we felt that the player would gain more from seeing what happened to the top half of the destroyed statue so that the true scale and size of the sculpture could be seen and experienced by the player of the game. In order for the size and scale to really make an impact on the player, other pieces were needed in the landscape of a size more similar to that of the player. For these objects our group chose what looked like the remains found in an archaeological site of an old egyptian/mediterranean civilization. The ruins strewn across the landscape near the statue highlights the eventual collapse of previous grandeur. In the poem, the pedestal of the statue reads, “…Look on my Works, ye Mighty, and despair!” However, now, “Nothing beside remains.” The player can see that everything here was once grand and beautiful, and yet sadly nothing beside remains are left.\n\nThe second part of our game was the puzzle aspect. This was created originally in a separate unity scene that we would incorporate into the larger desert scene later. This puzzle is a six piece 3D puzzle that when put together depicts an old illustration of what life may have looked like back in the time of the great King Ozymandias. This part of our game is in first person also, and was initially coded with a Virtual Reality control scheme so it should feel even more like a hands on exercise in a lost and forgotten world. Once the puzzle is successfully completed, a pyramid rises out of the ground as a “reward” for the player and acts as a testament to the rise and fall of different empires and civilizations, and a dramatic reading of the poem begins. As we learn from our past, we should be so lucky as to create more grand structures and creations for mankind to marvel at. It is a (hopefully) never ending cycle of creation followed by destruction. The knowledge that nothing will ever last forever should never impede our ability to create beauty. Ozymandias and our game stand as reminders to the importance of having history to look back on in the first place.\n\nCreating the individual Objects and Puzzle\n\nThe first things that needed to be created were the puzzle pieces and sand terrain. To create these objects we needed to start with basic cube shapes. These cubes heights were decreased and textures were imported in order to give them their appearance. In this case we imported sand textures from an asset pack for Egyptian style topography. In order to make a large desert landscape, copying the same object over and over and repeatedly adding it next to each other was necessitated. The difficult part of this process was determining the correct height for each of the objects relative to one another in the game. Not only did the objects need to physically make sense next to each other, the textures needed to be applied to each of these objects in order for them to look appropriate and uniform in reference to one another.\n\nThe next set of objects that needed to be created and configured were the pyramid and sand dunes. The pyramid was a little bit more simple to create as the model is entirely made out of cubes. This set of cubes was turned into a prefab which is a function of unity that allows you to create and store properties on a multi-part object with all of its components, property values, and so on. The sand dunes were more difficult to construct because they had to be rounded into trapezoidal-esque shapes in order to resemble their real life counterparts. The modification of the initial cube shapes into these more rounded ones was done in blender by modifying the vertices on the object. Once it was put into the desired trapezoid shape,the appropriate textures were applied to the pyramid and sand dunes in a similar manner to how we did it with the puzzle pieces and original sand terrain.\n\nThe next task that needed to be accomplished was scripting the gameplay. This meant that every scene that we were going to make had to flow into one another seamlessly. The script that needed to be written was such that when the puzzle was completed the pyramid would emerge from the ground and the reading of the ozymandias poem would play out of the game’s audio. A puzzle panel script was developed that ensured if the pieces were placed in the correct position on the panel, the pyramid would appear. It is important to note that the script was added to the pyramid and not the puzzle because the pyramid is the object that was being affected by the completion of the puzzle. This script included trigger events that would cause certain actions to unfold on screen. In this case, the pyramid was raised out of the ground a certain magnitude in the y direction as soon as the puzzle was completed.\n\nThere is also a first person controller on the game which allows for the gameplay to feel like you are walking through the game yourself. The first person aspect allowed for a more immersive experience when exploring the ruins and desert landscape. In the puzzle portion of the game a VR system was incorporated to allow users to have a “tangible” experience with the canvas user-interface (the puzzle). Several scripts were made to allow the player to face the canvas from where the VR camera was positioned and move the camera accordingly based on the position of their gaze.\n\nThe one real issue our group ran into was the fact that we had two separate games created that had to be integrated into each other. In the end we could not get the puzzle to work in the larger first person controlled environment so we had to keep them as separate programs.\n\nWhat we took away from the project\n\nThe best thing our group did was split up the workload. We realized quickly that the skills of our group members varied, and thus making each of us do equal amounts of the same work did not make sense. Naturally, we decided that giving each person individual tasks would make the process of making our game, and subsequent parts of the project, much smoother. There were three main tasks our group had to complete: the coding and creation of the game, the trailer/review video, and the creation of this game design document. Once we had this organized, the creation of the game became much easier. With two of our group members working on the hands-on coding and object creation, the rest of us were able to give outside ideas and suggestions on what we wanted in the gameplay. Also of note is that our video creation was more difficult than expected as our group did not have access to the iMovie video editing software. This, then, resulted in a manual creation of composite shots, transitions, and title cards, which is much more intensive and difficult than using the premade iMovie templates.\n\nThroughout the semester, we have played a wide variety of games, with each game teaching us something new about the world (and worlds) of video games. Lord of the Rings Online introduced us to MMORPGs, while simultaneously offering an incredible remediation of arguably the greatest fantasy epic in recent history. Braid shows us the potential for video games to serve as symbols and metaphors for our humanity and our flaws therin. Papers, Please exemplifies the concept of procedural rhetoric by plunging the player into a world where morality is defined by laws of authority. Gone Home illustrates the lush storytelling power and potential of video games, and Portal combines many of these elements in an argument against the growth of human dependence on technology. However, despite the vast differences found in these games, they all have one thing in common that was impossible for us to ignore: they were all made by someone else.Creating Ozymandias gave us the unique opportunity to create something of our own. Although none of us thought it would be easy to create a video game, we naturally feel a newfound sense of respect towards professional game creators and of pride in our creation. This assignment gave each of us invaluable insight into the challenges and (sometimes) consequent triumphs of game making. Whether we were on the creative side of development or the programming side, we each now have a much greater understanding of and appreciation for game design, and we are excited about our future endeavors in the exciting and ever-changing world of video games.\n\nGame Trailer:\n\n\nGame Development: Max Beck, Justin Yu\n\nGame Design Document: Joseph Finkelstein, Peter Taylor (additional)\n\nTrailer/Review Video: Alex Leroux, Pat Demarco\n\nAudiovisual recording: Peter Taylor\n\nTrello Board Operation: Peter Taylor\n\nVideo Games: Making Fools of Us All\n\nA video game’s first job is to fool its players. We have talked at length about how games have their rules and procedures for players to follow. What we have not discussed is how these rules can differ completely from our reality, yet we are made to believe these rules are real and important. In my fiction writing class we learned the same thing, just in a different medium: the more a fiction deviates from reality, the more novel truths the creator must convince their audience to accept. A world unique from ours still needs to be a sensible one. If the creators fail to make us believe in their world, the game fails, but if it succeeds…well, we as players get to enjoy a whole new reality.\n\nFew games have been as exemplary of this as Thomas Was Alone. Upon starting, the rules of this world are simple: you are a red rectangle by the name of Thomas, moving up and to the right to reach the next level. That is the core game structure; you take control of various rectangles and get them from one side of the screen to the other, dodging obstacles along the way. This world is easy enough to accept, but the creator, Mike Bithell, throws in an extra rule: these rectangles are self-aware with their own personalities.\n\nThomas Was Alone Trailer\n\nOn the surface, these rectangles differ by no more than their color, shape, and jumping ability, but through these differences the creator spins a story in which these attributes shape how the characters interact with the world and each other. In this long journey from one side of the screen to the other, they learn what makes them unique, what their life purpose is, and even how to love one another. Yes, that’s right. One of Bithell’s rules is that these rectangles can fall in love, thus we see a short, cynical square named Chris fall deeply in love with the thin, horizontal Laura who lets him jump higher than ever.\n\nChris (bottom left) and Laura (upper right) getting ever closer\n\nThe craziest thing about this? It works! Bithell convinces us that rectangles are ready and willing to take on these human attributes through brilliant storytelling and character development. Of course, this could have all been much easier with humans, or maybe even some talking animals, anthropomorphizing familiar objects to bring the rules that much closer to reality, but no. In this world we are taught to invest in and empathize with shapes.\n\nClaire (bottom) saving John (left) and Thomas (right) in proper superhero fashion\n\nNow why does it matter that we believe in rectangles that eventually sacrifice themselves to offer others their freedom? Bithell had a perfectly fine game full of problem-solving and coordination, so why don’t the rules stop there? To answer my own question with another, what’s the point of moving a rectangle across a screen? This is not Tetris or Mahjong, other rectangle-based games with high scores as the goal. In fact, there is no quantitative value for actions beyond making it to the next level (and collecting the occasional floating square for an achievement). The value lies within the story. With each level, you learn a little more about the world you are jumping around in, and the partners you are jumping around with. If Bithell failed to make you believe there is value in this, you likely would not be playing.\n\nBy tricking us into believing that this two-dimensional world is one with a rich history and dynamic characters, Bithell leaves you with values to bring back into this mundane world. He teaches you what it means to be a friend. He teaches you the value in serving a higher purpose. And more relevant than ever, he teaches you that we are never truly alone. With lessons like these, who cares that you had to be tricked to learn them?\n\nThe Last of Us: Pushing the boundary between cinema and video games\n\n\nWARNING!!! This post contains heavy spoilers for Last of Us part 1 and 2…\n\nI recommend watching all of the clips in this blog post to get a better sense of what I am discussing, but they do include a heavy use of language and violence which might disturb some people.\n\n\nWOW! The Last of Us has to be one of the most remarkable game series I have ever played. With the release of The Last of Us Part II this year, my mind was absolutely blown. This series redefined the line that separates a game from a movie. Now I know that’s a very bold statement to make, so here is some background for those of you who don’t know the game:\n\nThe Last of Us was released in 2013 by the video game developers Naughty Dog who were previously known for their games Uncharted and Jax, which told these grandiose stories of adventure. The Last of Us follows Joel, a father from Texas who is impacted along with the rest of the world by an outbreak of a virus that turns people into these zombie-like creatures called “infected.” The opening is this devastating scene where we see Joel trying to escape with his daughter, who is fatally shot by a soldier who is given orders to shoot them since they might be infected. This heartbreaking scene ends, and the title card cues just like a movie. Already with this 20-minute long opening scene, the player is shown something that was so unique and never seen before in a video game. The graphics are beautiful, the music is powerful, and the emotions and despair in these characters can be felt by the player.\n\nA screenshot taken in a cutscene from the first game\n\nThe whole game plays like a movie, and throughout, the player witnesses more moving moments as the characters develop and change along the seasons (separates the four acts of the story). There is a lot to the plot, so I obviously can’t talk about all of it, but the main idea is that Joel is sent to deliver this girl (Ellie), who might be a possible cure to the virus to the fireflies (a group trying to find a cure) who are stationed across the country in Salt Lake City. Joel and Ellie begin to bond as the seasons change, and Joel begins to see Ellie as the daughter he lost. Then after many heartbreaking and heartwarming events, the game reaches its final scene.\n\nThis is the last act of the first game in the series\n\nThis last scene left players with so many emotions and wanting MORE. The Last of Us instantly became critically acclaimed, won multiple Game of the Year awards, became one of the best-selling video games of all time, AND is often referred to as one of the greatest video games ever made… Now that’s a lot…\n\nI mainly have not talked about gameplay so far in this post, and that’s because this game is unique in that I don’t think the gameplay is as essential or revolutionary (still an exceptional achievement in the game) in the effect that the game leaves on the player. This leads me to the primary point of this blog.\n\nThe Last of Us plays like a movie, which is what makes the game so powerful to watch and play. This game redefined what it means to be a video game and moved past the importance of gameplay and focuses primarily on the artwork, cinematography, voice acting, and everything else, which makes a movie come together. This game alone introduced a whole new genre of games that goes beyond the typical gameplay formats and focuses mainly on the story and cinematic experiences. Since the release of The Last of Us, many games have followed this design and you even have games like God of War (2018) which changed genres and follows The Last of Us’ storytelling format. All of this has further pushed the question of when does a video game become analogous to a movie.\n\nThen along came The Last of Us Part II…\n\nWith a least six years in the making and a budget of around 100 million dollars, The Last of Us Part II pushes this boundary to the next level.\n\nTo get an idea of this budget and the team that went into making this game a reality, it cost as much to make movies like 1917, The Wolf of Wall Street, and Deadpool 2. Like 1918 and The Wolf of Wall Street, which grossed over 300 million dollars in their box office runs, The Last of Us Part II broke records of being the fasting selling PS4 exclusive by selling over 4 million copies in its first week. Assuming that every copy was a standard edition game valued at 60 dollars (which is inaccurate since there are limited editions ranging up to 300 dollars), the game made over 240,000,000 million dollars in its first week of launch.\n\nAside from the numbers, every scene in this game is beautifully crafted and brought to life with the intricate level of detail in the artwork, character expression, and the soundtrack. The landscapes and cinematography displayed in this game rival films and even surpass them knowing that it is all digitally created through lines of code. On top of that, the story is this harrowing and captivating tale of revenge and retribution where, as the player, you question every decision you are forced to make as your character until, at the end, you are left with nothing. These dark and gritty moments are contrasted with relaxing scenes that give you a sense of ease until being thrown back into a ruthless, unforgiving world.\n\nA scene in the game where Ellie plays an acoustic rendition of “Take on Me”\n\nUnfortunately, I can’t write out the entire plot the the game since it is over 20 hours of content, but here is the last scene to get a better understanding of the story and meaning that this game paints for the audience.\n\nGameplay and cutscenes from the last act in the second game\n\nEven without any context of the game, this final scene alone shows the emotions and struggles that the characters face. It also demonstrates the game’s wide range of locations and scenery, just like a movie. With all of these components that have now been laid out, what makes this game different than a movie? In my opinion, nothing. Of course, it is a little different since the story is over 20 hours long and still follows most game designs in that you interact and move the character outside of cutscenes. Other than this, The Last of Us Part I and Part II are no different than a movie you would see in theaters. Both forms of media lay out masterfully crafted stories with real life applications, character development that allows the audience to empathize for the fate of these characters, and cinematography that paints these magnificent portraits that place us in the world that the story revolves around.\n\nJust as The Last of Us Part I was a perfect ending to the PS3, The Last of Us Part II is the perfect end to the generation of the PS4. These games have opened up the doors for future games to choose to transcend the traditional format of quests/missions and instead become a complement to the art of films.\n\nThe Effects of Going Free to Play: A Case Study\n\nFree to play; it’s a fairly simple concept. Take your phone, PC, or console, load up its respective game/app store, download, and play! Hundreds of millions of people play free games, as no direct payment is required to play (other than the expensive device, of course).\n\nBut what about pay to play games?\n\nThe number of people playing these kinds of games are lower since a direct payment is required (on top of that expensive device…yikes!) Many people can’t afford or aren’t willing to shell out that extra cash for a game, which could amount to $70-$80, leaving Ashley Hemenway’s “casual gamer” behind.\n\nMy Credit Card Balance After Steam Sales\n\nClearly, there are two distinct communities that make up most of the free/pay to play games. The dedicated gamers might be found in both communities, but not vice versa. This split creates two different ways games are marketed and consumed, which should mean that these communities won’t interact with each other.\n\nAt this thought I came to multiple questions that have even more answers: What happens when a pay to play game goes free to play? How is the community affected? How is monetization affected? WHAT HAPPENS?!?!?\n\nSurprise! I can tell you, as I have been a part of this community and monetary shift… twice now. Combined, I have over 1300 hours spent on these games, and I still play both to this day. Destiny 2 and Rocket League are two of my favorite video games, period. The former is a lore-filled, immersive experience and the latter is a thrilling twist on the classic sport of soccer (or football, however you say it.) \n\nBefore I dive into the effects of going free to play on these games, I want to give a clearer definition of free to play and pay to play. All free to play games are either games that have advertisements littered throughout or are “freemium” games: a free download, but progress can be made by paying for in-game currency. Some games are truly free to play, but they offer premium cosmetics, i.e. Fortnite. Pay to play games have an asking price, but many also offer premium cosmetics as well.\n\nAlright, let’s start with Destiny 2.\n\nTaken from GameSpot\n\nDestiny 2 released at $60, a standard price for a AAA title, and was developed by Bungie and Activision. In-game currency could be purchased to buy cosmetic items, and expansion packs were released at premium prices for fresh and novel in-game content. Riding the wave of popularity that its predecessor had, Destiny 2 sales were off the charts. Bungie and Activision never gave specific numbers, but more units of Destiny 2 were sold in its first year compared to its predecessor (sold from 2014-2017). In 2018, a third-party site, DestinyTracker, logged roughly 8 million users on Destiny 2, and roughly 600K played daily. In short, it was one of the biggest games in the gaming industry, competing with the likes of Call of Duty.\n\nOn October 1st, 2019, Destiny 2 became free to play. What happened to the numbers? The culture? Were casual gamers introduced into the fiercer side of gaming?\n\nOn October 4th of this year, a little over 1 year after becoming free to play, DestinyTracker logged roughly over 20.6 million players with 1.4 million active players online. That’s around 2.4 New York Cities registered as a player, and 1/8 of New York City actively playing. Holy smokes. Unfortunately for Bungie, they made no money directly from adding millions of players, but they exposed the new players to the cosmetics and the expansion packs. In 2019, these same cosmetics and expansion packs earned Bungie a whopping $300 million, with only a ¼ of the year including the “free to play version” of Destiny 2. The numbers for 2020 haven’t been released yet, but with the release of 2 expansion packs and an overhaul of the microtransaction shop, we can expect to see that number go up.\n\nThere’s something else besides numbers that are extremely important: the community. The Destiny community has been around since 2014, and it’s even stronger now. Of course, adding players will directly increase the number of avid community members. We can even assume that some casual gamers were exposed to Destiny 2 and became a part of the Destiny and gaming community. Content creators became more popular, as twitch streamers and YouTubers alike saw their view and subscriber counts soar. Hackers in the PvP mode became more prevalent. Puzzles and mysteries in the game that rewarded rare items became a team effort of millions. Overall, going free to play created a buzz around the game that hadn’t been felt before, and the sheer exposure Destiny 2 garnered will ingrain itself in popular and gaming culture alike.\n\nPicture of a Number Puzzle that Took Multiple Days to Solve by Hundreds of People\n\nNow, to Rocket League.\n\nCourtesy of Epic Games\n\nThis game is the most sports-like game I know. It’s a riveting 3-on-3 soccer match with cars, lasting 5 minutes with overtime (if necessary). Rocket League was released in July of 2015, sold for the small price of $20. Like Destiny 2, this game offered cosmetics for a premium price. Rocket League did incredibly well for its small developing team Psyonix; it made over $110 million from sales and microtransactions in its first year and accrued over 5 million active players. These numbers would steadily increase year after year, making Rocket League a smash hit in the gaming community.\n\nThe numbers certainly are impressive, but I believe what truly drives Rocket League (pun intended) is its involvement in e-sports. As of now, Rocket League is one of the most popular e-sports in the world, competing for viewership with League of Legends and CS:GO.  In the Rocket League community, organizations like NRG, Renault Vitality, and G2 are household names, and superstars like Squishy, jstn, rizzo, turbopolsa, and fairy peak are the most known players around. They play for the world championship title in the Rocket League Championship Series (RLCS), which averages around 100K views each year. Each season includes its own storyline, clutch moment, and heartbreak.\n\nThe Greatest Moment in RLCS\n\nRocket League went free to play just short of two weeks ago on September 23rd, 2020. How will this affect its revenue and community?\n\nI want to use Destiny 2 as a model here. Destiny 2 microtransaction sales are on the rise, and I believe Rocket League will experience the same effect, but on a lesser magnitude. However, Rocket League will certainly make up for it. There’s no doubt in my mind that most of the money will be coming from e-sports. Increased popularity will boost viewership, which will boost ticket sales for LAN events. Already, the average viewership on Twitch alone has gone up from around 30K to 60-80K. New organizations will flock to pick up the increased high-skill player base to compete in RLCS, leading to more sponsorship deals and funding. Prize pools for tournaments will become much larger. I believe that the already large e-sports scene of Rocket League will grow exponentially and surpass games like CS:GO and Rainbow Six Siege.\n\nI haven’t even mentioned the player base. As an active player for a couple years, I normally see around 100K-200K online each day. I logged on come September 24th, a day after free to play launched, and nearly 1.1 million people were playing. That’s almost a million new players AT ONCE. Not only that, but that daily average competes with the likes of Destiny 2.  Given time, a portion of that million could become the next jstn, the next squishy, the next turbopolsa. A casual gamer now could become RLCS world champion in a couple years. Where Destiny 2 won in microtransaction/DLC sales, Rocket League will win big in the e-sports scene.\n\nDon’t get me wrong, the growth of Destiny 2 after it went free to play was fun to watch. The community came together like never before, and, most importantly to Bungie, they made a lot of money. The Destiny franchise will go down as one of the all-time greats, facilitated by the free to play move. However, I’m even more excited to watch the growth of Rocket League. This game has the potential to amass the same player base Destiny 2 has and to grow one of the most exciting e-sports to watch. Do I know exactly what will happen with Rocket League moving forward? No, I’m speculating based on the rise of Destiny 2. But I believe that Rocket League will become a cornerstone for all gamers, casual or avid, and it will become the poster child for the e-sports scene.\n\nAfter all, “This is Rocket League!”\n\n-Alex LeRoux\n\nDiscovery and Control: How Video Games and Tabletop Games are Learning from One Another\n\nThis week, I once again found myself listening to one of Geoff Englestein’s excellent “GameTek” segments on the podcast Ludology. Geoff’s short segments cover scientific and psychological topics related to gaming, and the topic from this installment – episode 230.5 – was “Implicit vs Explicit”. Geoff’s analysis underpins a foundational struggle underlying game design, one which I feel explains many of the recent trends in the game mechanics found across both video and tabletop gaming. In case you have six minutes to spare, do go listen to Geoff’s eloquent and insightful analysis for yourself: \n\nListen to Geoff’s Episode\n\nIn this brief segment, Geoff uses a case study from his historical game Versailles 1919 to describe a common tension in game design: when should designers make the systems of a game explicit for player’s to understand from the outset of play, and when should they leave parts of the system hidden such that players must learn by discovery? In his own design, Geoff wrestled with whether or not he should make the political stability of regions explicitly stated on the game board, or if he should make differences in stability expressed varying ratios of each region’s cards in the deck, the latter being an implicit way to show region’s individualities that requires repeated play to learn for oneself.\n\nThere is evidence that player’s engage in implicit learning before they can even articulate what they have learned. Geoff cites the Iowa Gambling Task, an experiment in which individuals could draw from any of four decks (each with different ratios of cards) and gained or lost money based on what they drew. Although it took forty draws before most players could articulate which decks they felt were better or worse, after only ten draws players showed stress reactions when they decided to draw from one of the bad decks. \n\nGeoff concludes that designers can leverage implicit information in games to reduce the cognitive load on players. He also notes how video games tend to do this well – hiding lots of information about the strengths and weaknesses of various options so that players must discover the system through play. Implicitly learned systems can likewise create a more immersive experience within the fiction of the game world by not plainly explaining their rules.\n\nTabletop games typically feature explicit rulebooks outlining their systems.\n\nNevertheless, there is a degree of control gamers can gravitate towards when rules are explicitly stated. Many board games are easier to approach competetively as a first time player than many video games, as it’s far more difficult to shortcut the learning curve of discovery than it is to efficinetly digest a rules explanation. \n\nAs I read this part of Geoff’s analysis, I realized I saw a trend in popular gaming over the last two decades. Video games often seem to be utlilizing smaller rules systems and online communities that work to provide explicit conslidation of those systems, while new tabletop games are striving for the open-ended allure of video games, wherein systems are largely implicit and left to be discovered. \n\nFor example, the most high-profile Kickstarter successes by board game designers in the last decade have been games like The Seventh Continent and Gloomhaven, games with massively expansive worlds and stories to be explored over repeated plays. New types of cards and challenges are unearthed as the game progresses, effectively melding the immersive discovery of video games with the tactile nature and social allure of tabletop gaming. On a personal level, I was intrigued by both of these designs when droves of reviewers called them innovative, and after trying them found myself impressed with the way in which both games put players on a constant brink of discovery, both in terms of the fictional world and gameplay mechanics.\n\nGloomhaven” is a massive fantasy board game, weighing almost 22 pounds and containing hundreds of hours of gameplay across branching scenarios and divergent storylines.\n\nConversely, one of the major genres of games to succeed in the last five years are battle royal and arcade games such as Fortnite and Call of Duty: Zombies. These games see players repeatedly playing in the same gameplay space, one which is very small by video gaming standards, and striving to improve their performance in game after gme with relatively little randomness to obstruct the player’s agency. Sound a lot like a digital implementation of a tabletop game? I think so too. Moreover, the increasing popularity of forums and write ups in video gaming communities has led to more sharing of explicit information than ever, and increasing numbers of players are flocking to these articles to find out the exact mechanisms at play behind their favorite game’s flashy graphics. In essence, video game communities are writing and sharing the rulebooks to their games, even though rulebooks are an often maligned attribute of tabletop gaming.\n\nThe original map for the hit game “Fortnite”.\n\nI don’t foresee these trends continuing forever, but I do think they represent much needed growth from designers in both digital and analog games. Implicit and explicit systems have their place in all kinds of games, and judicious employment of each is crucial to design. As a game designer, I’m keen on identifying the strengths of various mediums, but I also love to identify where design has restricted itself based on unfounded assumptions. Why should a Skyrim fan limit their gaming to digital worlds when analog games like Gloomhaven might satisfy the same itch? Mediums should indeed play to their strengths, but all games can bring in new audiences and innovate in their respective fields by studying other game forms and rethinking hitoric assumptions.\n\n– Dylan Kistler\n\nThe Legend of Zelda and the Silent Protagonist\n\nNintendo has a history with silent protagonist: Mario rarely, if ever, speaks in his games, Samus in the original Metroid games, and all the avatar characters in Fire Emblem. However, probably the most famous example of Nintendo’s love of silent protagonist is Link, the main playable character in the Legend of Zelda series.\n\nLink as seen from Ocarina of Time promotional art\n\nWhen video games were first coming into vogue, it made sense to have a main character of few words. The sound cards were only capable of making chips and chirps, and its not like the stories were so involved as to require an in-game exposition. But, as it stands now, it is increasingly more strange how Nintendo refuses to upgrade Link from a silent protagonist. The ways they have gotten around giving Link speaking roles in some of the more recent Zelda games are honestly kind of hilarious in how far they reach. In 2014’s Hyrule Warriors, all of Link’s spoken dialogue and in-battle quotes are done through a fairy named Proxi, and in 2017’s Breath of the Wild, Link is the only major character not to have voice acted lines in cutscenes.\n\nThe introduction of Proxi in Hyrule Warriors\n\nThis refusal to give Link a voice, and by extension a personality, is extremely frustrating to Legend of Zelda fans as the games gradually become more about the story and relatonships between characters. With the new Hyrule Warriors games and Breath of the Wild prequel coming out on November 20, I am curious to see how Nintendo will once again skirt around Link’s silence, especially scenes between just him and one other character.\n\nPromotional image for the upcoming game Hyrule Warriors: Age of Calamity\n\nDeath, Taxes, and Video Games\n\nFor being one of the few things guaranteed at birth, death is a fickle thing. I am not promised how I’ll die, when I’ll die, or where I’ll die, but death is promised nonetheless. Maybe I can chalk up death’s inevitability to life being unfair, or it could be the only thing that’s fair when the credits roll on my game of life. But no matter how much I prepare for this inescapable ending, death is often unexpected. \n\nIt took me a whole year to realize Pokemon evolution was a thing…\n\nThis (among other things) is where reality and video games differ. Yes, death is assured in video games, but it is expected at some point in my journey. Whether that is my Chewbacca crumbling into a pile of Lego limbs after losing four hearts or my Charmander fainting in battle against yet another wild Pokemon, death is a part of the contract you sign as soon as you boot up your system.\n\nFor being one of the few things guaranteed at birth, death is an unfamiliar thing… until it’s not. I knew what death was from an early age because of how innately straightforward it is; it’s the state of not living, of not being, anymore. That is obviously an oversimplification of an incredibly complex idea. But, we aren’t born with the mental capacity to understand its intricacies, and until we do, we are forced to live with this elementary concept of death. \n\nThis is where reality and video games are similar. My mortality has and always will be easier to understand than others’. My life is finite and full of “Game Over” screens. I made tentative peace with that a while ago, whether that came in the form of turning to religion or throwing a few controllers across the room. Still, despite my internal preparation, I couldn’t wrap my head around a friend or loved one passing away.\n\nVideo games taught me to expect death, but Mass Effect broke those seemingly sacred rules. For the uninitiated, Mass Effect is the ultimate mix of a third-person, sci-fi shooter and a soap opera. In between your firefights with invading alien hordes and saving the universe from genocidal annihilation, you spend your most meaningful time convincing NPCs to join your crew aboard your equivalent of the Millenium Falcon. Over the span of three games and 200 hours, these crewmembers feel more like friends as opposed to a few megabytes in the game’s bedrock of code.\n\nNose goes on filling up the tank!\n\nMy favorite crewmember was Legion, an enemy robot, or Geth, that inexplicably joins your quest. Legion is a conglomerate of every Geth personality and, therefore, struggles with the concept of free will, referring to itself as “we.” Despite its steely exterior, Legion has a lovable personality, a hilariously dry sense of humor, and is always eager to help his commander. \n\nThroughout the trilogy, I died countless times while Legion charged through levels like a bulletproof battering ram. I was conditioned to believe Legion was invincible in the face of my own helpless mortality.\n\nGreat soldier, terrible cuddler.\n\nTowards the end of the third game, Legion and the Geth have a chance to be freed from the chains of their code… with one catch: Legion must sacrifice itself for its race to achieve true free will. His final words before shutting down one last time are “I’m sorry. I must go.” After three games of referring to himself as “we,” Legion finally recognizes his individuality. Through tears, I reloaded the level and tried again and again and again to save Legion to no avail. Death is inevitable, no matter how many times I tried to help my friend escape it. \n\nMy great grandma passed away later that year, and I thought I was ready. I thought I knew what death was. I tried reminding myself of my oversimplification, and that made me sick. I told myself that “she was in a better place,” but I knew I was lying to myself. I wanted to hug her once last time, or eat her homemade pie, or just hear her soft voice again. But, all I could do was cry. You can do everything right, but sometimes that’s still not enough. No matter how prepared for or familiar you are with death, the inevitable is labeled so for a reason. The most important lesson I’ve learned from gaming and life is that, after the necessary tears and mourning, I have a mission to pursue every day, whether that is saving the virtual universe or just spending time with my friends and family I am fortunate enough to still have with me today.\n\nPokemon Showdown: The Underground Community of Smogon University\n\nWe’ve all played a Pokemon video game before. The iconic franchise started with Pokemon Red and Green in 1996 and has since spawned eight generations of video games, a theme park in Japan, and countless Pokemon cards cherished by 8-year-olds around the globe.\n\nPokemon Red and Green were originally released in Japan in 1996 for the Game Boy console.\n\nFor the past 25 years, Pokemon video games have all followed the same formula:\n\n 1. Receive a starter Pokemon.\n 2. Battle other Pokemon trainers to increase the level of your Pokemon, including bosses called “Gym Leaders” along the way.\n 3. Defeat the final boss, the “Champion” of the region.\n 4. The End…?\nClassically, every Pokemon video game starts with a battle between the player’s starter Pokemon and his or her rival’s (the in-game archnememy) level 5 starter Pokemon.\n\nFor me personally, the model has gotten stale for a couple of reasons. Firstly, Pokemon games are non-competitive; players are mostly self-contained within their own environment and the infrastructure within the game to battle other humans is mediocre at best. Secondly, the “leveling grind” to level your Pokemon to the maximum level of 100 is mind-numbingly boring. Here’s some context: a Pokemon requires approximately 1 million experience points to reach level 100. Defeating the average wild Pokemon, which takes 30 sec-1 min, will grant approximately 500 experience points…yeah. You can do the math. To many of us, these games just start to feel a little old.\n\nI don’t know how long it took this person to get Rhydon to level 100, but it was probably too long.\n\nEnter: Pokemon Showdown.\n\nThe days of leveling up Pokemon and defeating pre-programmed NPC’s are no more. In the span of 5 minutes, you can visit, customize a team of Pokemon by level, move set, and other traits, and then engage in battle with another user who has done the same. The Internet is truly amazing.\n\nGameplay of a battle with another user on Pokemon Showdown.\n\nWhat impresses me so much about the Pokemon Showdown community is how creative it is. TPCI (The Pokemon Company International) created a competition circuit revolving around the official Pokemon games, but Pokemon Showdown has them beat by a landslide in popularity. Members of the Pokemon Showdown community have converged to an online forum dubbed, “Smogon University” to create their own rulesets, ban lists, and tournaments completely separate from the official Pokemon ones.\n\nSmogon University forums: a repository of advice, competitive Pokemon battling resources, and friends.\n\nPokemon Showdown appeals to even casual Pokemon fans. There is a game mode named, “Random battle” where a team of Pokemon will be automatically generated for you to play against another player with a similarly random generated team. My roommate and I often take advantage of this mode during late nights, or particularly boring Zoom lectures. Further, many more artistically talented members of the community have resorted to creating their own Pokemon, complete with art, move sets, and other data given to real Pokemon. Pokemon Showdown even has a game mode called “CAP” (“Create-A-Pokemon”), made specifically for competitive battling using both real Pokemon and these fake Pokemon, something I think is really beautiful and indicative of both the community’s creative spirit and competitive drive.\n\n“Necturna” and “Syclant” are just two examples of Pokemon that were 100% designed, balanced, and created for Pokemon Showdown. Made by the community, made for the community.\n\nSo next time you are about to switch on your Nintendo console to level another Pokemon to level 100, think again. An underground, community-generated world is available to you within just a few quick clicks of a mouse. See you on Pokemon Showdown!\n\nOh, and here’s a quick guide to Pokemon Showdown if you are interested:\n\nA guide to Pokemon Showdown by a popular youtuber, “PokeaimMD”.\n\nRated E – Not Quite For Everyone\n\ncontrollerPractice makes perfect, but do you ever wonder why some people need less practice than others? Have you ever been awful at a video game and figured, “oh well I just need to get used to it” but then you never caught on? If you never have been in this position, you can take it from me. It is very upsetting to try and try and still not be able to pick up simple moves in Super Smash Bros, or most games truthfully. For years, I have made excuses as to why I am no good at video games and now I have finally found a possible scientific reason. My brain structure may be my flaw.\n\nThe Cerebral Cortex journal posted neurological research that studies the correlation between learning ability and the size of three specific parts of the brain. The researchers took 39 healthy adults aged 18-28 years who has reported playing less than 3 hours of video games a week for the past two years. The research was to be based on their learning ability on a game called Space Fortress, developed at the University of Illinois, over a 20-hour period. These subjects were randomly split into two groups: a fixed priority group and a variable priority group.\n\nFixed Priority – aim to get the highest score possible\n\nVariable Priority  – series of tasks that forces the player to improve their skills in different areas\n\nSpace Fortress\nScreenshot of Space fortress from\n\nEach subject was given an MRI (magnetic resonance imaging) scan to determine the size of three specific structures: the dorsal striatum (putamen and caudate nucleus), the ventral striatum (nucleus accumbens), and the hippocampus. The size of each structure was recorded in comparison to the total volume of the subjects brain.\n\nbrain structures.jpeg\n\nchart 1\n\nThe chart on the right shows that the learning curve is similar between the groups; however, the variable priority group scored 29% higher by the end of the training. This suggests that we learn better when we allow ourselves to focus on one task at a time. So maybe instead of button smashing on Super Smash Bros., I should be trying to focus on learning the moves of a specific character (but where’s the fun in that?).\n\n\nWhen examining the correlation between brain structure and learning ability, the hippocampus was found to not be predictive of performance of improvement. This puts the focus on the striatum. The volumes of the dorsal striatum has a positive correlation with training induced performance improvements for those in the variable priority group. However, the fixed priority group has no relationship with the volumes of the dorsal striatum.\n\nlearning curveIn early training sessions, the ventral striatum (nucleus accumbens) was positively correlated with improvements in performance, but the same relationship was not seen in later sessions.\n\n\nThe research was concluded by arguing that “preexisting variations in striatal volume can affect the rate of learning in a complex task that involves the coordination and integration of many cognitive, motor, and perceptual parameters and rules, at least when conditions of learning capitalize on flexible learning strategies.”\n\nThat was a lot of science, but basically there are two things to get out of this study (for me, the non-scientific non-gamer).\n\n 1. The way you try to learn a game is important\n 2. Some of it may be your brain structures fault\n\nWhile these discoveries may give me comfort, it is obvious that while these effects may slow down the learning process, it is still possible to become skilled at a game with enough effort.\n\nFor now though, I’ll just blame my brain structure for getting kicked out of a Rainbow Six Siege round for not being able to kill a single person.", "pred_label": "__label__1", "pred_score_pos": 0.7038407921791077} {"content": "\n\n\nCheck out this interview from one of our sharpest leaders working from home, Cindy Ramirez. Cindy is a passionate project manager, wife and mom of a 1-year-old and most recently a newborn. She shares her story along with some strategies that have made her experience easier.\n\nTell me about your experience balancing mom-life and work-life.\n\n“At the beginning, it was a challenge to adjust to being pregnant, taking care of a 15 month-year-old and not falling behind during our busy season. Meetings and client phone calls were a huge challenge with my kid screaming in the background. But, eventually I found balance when I moved half my workday to the evenings and now I feel I’m even more productive than being in the office.”\n\nCindy Ramirez\n\nWhat have been the biggest challenges working from home?\n\n“Definitely trying to multitask constantly and missing team collaboration. Being in the office made working together a lot easier and now it’s more of a challenge to get in contact with everyone and coordinate schedules.”\n\nCindy Ramirez\n\nHave you found any strategies that make working from home easier?\n\n“Yes! Sticking to a prioritized task list and keeping a daily track of percentage completed on my projects has helped. Also, just being able to answer emails on my phone or texts from our field team without being in front of the computer makes the balance easier. I feel like the best thing we can do is just continue to check in on each other during this time and give support where it’s needed.”\n\nCindy Ramirez\n\nHow has working at 3Sixty Integrated changed?\n\n“From the beginning of this pandemic, the leadership at 3Sixty Integrated really stepped up. They supported all of our team members in different ways, and I think everyone can attest to this. For me in my situation, with being pregnant and having an infant at home, I was able to bring home all my office equipment early on to make working from home more effective. Also, my associates are lenient with meeting hours that work around my schedule. It’s really awesome being a part of a team like this.”\n\nCindy Ramirez", "pred_label": "__label__1", "pred_score_pos": 0.6443240642547607} {"content": "Marsupials Biology and Management\n\nThe majority of the world’s known mammals are placental mammals.  Placental mammals are specified by the presence of a placenta that enables the advanced development of the young before birth, a more developed brain, and some other skeletal features. Examples of placental mammals are humans, primates, bats, cats, dogs, ruminants, and rodents. Placental mammals comprise around 95% of the 5,220 species of known mammals. In contrast, marsupials are born at an embryonic stage of development. They then develop to independence by attaching firmly to the teat of the mothers. Teat may be external or throughout most marsupials covered by pouches of varying degrees of development until full pouches found in species like kangaroos.\n\nThere are ten lessons in this course:\n\n1. Introduction\n2. Anatomy and Physiology\n3. Behaviour\n4. Health & Disease\n5. Marsupial Carnivores\n6. The Diprotodontia -Kangaroos\n7. Other Diprotodontia\n8. Peramelemorphia\n9. Other Marsupials\n10. Marsupial Conservation and Management\n\n\nCourse Aims\n\n • Explain the likely origin of marsupials.\n • Explain classification of marsupials.\n • Identify common external anatomical features in marsupials\n • Explain common and diverging characteristics in the internal biology of marsupials.\n • Discuss and compare behavioural characteristics in a number of different marsupials.\n • Describe health issues that affect marsupials.\n • Identify and describe the biology, behaviour and care of marsupial carnivores. \n • Identify and describe the biology, behaviour, and care of Macropods from the Diprotodontia order.\n • Identify and describe the biology, behaviour and care of non-macropod marsupials in Diprotodontia.\n • Identify and describe the biology, behaviour and care of marsupials in order Peramelemorphia.\n • Identify and describe the biology, behaviour and care of other marsupials, specifically from the taxonomic orders Didelphimorphia, Microbiotheria, Notoryctemorphia and Paucituberculata.\n • Discuss issues related to the sustainable management of marsupials.\n\n\nEnrol Now!\n\nFee Information (S2)\nPrices in Australian Dollars\n\nPlanAust. PriceOverseas Price\nA 1 x $726.00  1 x $660.00\nB 2 x $396.00  2 x $360.00\n\nNote: Australian prices include GST. \nMore information about\nFees & Payment Plans.\n\nEnrol Now 5% discount!\nSelect a payment plan:\n\nCourses can be started anytime\nfrom anywhere in the world!\n\nAll orders processed in Australian dollars.", "pred_label": "__label__1", "pred_score_pos": 0.8102796673774719} {"content": "Rig camera infrastructure\n\nCarefully considered courses to give you the most essential skills to begin a successful career in Design and Media.\nthis is an core unit of\nNo items found.\nthis is an elective unit of\nUnit outline\n\nWhat to expect\n\nThis unit describes the skills and knowledge required to install camera infrastructure for television and other relatively complex multi-camera productions such as live sport or entertainment events.It applies to individuals who work under supervision to rig cabling and dolly tracks according to predetermined camera plans.\n\nNo items found.\nLet's begin\nButton Arrow", "pred_label": "__label__1", "pred_score_pos": 0.6995387077331543} {"content": "Students will be introduced to contract law through the study of case law and statutes, focusing on the elements of a valid and enforceable contract. They will learn to critically evaluate competing theories of contractual validity, synthesize the law and apply relevant principles to fact patterns designed to develop a practical understanding of the elements of an enforceable contact.\n\n\nLAW 101, LAW 110 and LAW 210\n\nCourse Outlines\n\n\nEffective Term\nPDF Acrobat Adobe Reader Spring 2018 onwards", "pred_label": "__label__1", "pred_score_pos": 1.000006914138794} {"content": "\n\n2021 Curriculum CFA Program Level II Quantitative Methods\n\nBacktesting & Simulation\n\nDownload the full reading (PDF)\n\nAvailable to members\n\n\nThis reading provides an overview of backtesting and simulation of investment strategies. Backtesting and related techniques enable investment practitioners to simulate the performance of investment strategies (especially quantitative strategies) using historical data or data derived from the distributions of historical data, to generate test results, and to analyze risk and return, without investing any real capital in the strategies.\n\nThe rise of big data and the increase in computing power have spurred the development and spread of quantitative investing. Almost every major data vendor has available tools that make systematic backtesting and simulation increasingly accessible. Off-the-shelf software allows backtesting and simulation of endless combinations of possible investment strategies, formulation of multifactor models, and construction of investable portfolios. Developing quantitative investment strategies may appear relatively straightforward, but in reality, it is not. However, understanding the steps and procedures, the implicit assumptions, the pitfalls, and the interpretation of results in backtesting and simulation is a prerequisite for proper utilization of these tools and successful development and implementation of investment strategies.\n\nIn a CFA Institute survey of nearly 250 analysts, portfolio managers, and private wealth managers on quantitative investment techniques, 50% of respondents reported that they had conducted backtesting of an investment strategy within the past 12 months of the survey date. This result underscores the importance of backtesting (and other simulation techniques) for investors in practice, and this reading is a starting point on the journey to building this core professional competency.\n\nLearning Outcomes\n\nThe member should be able to:\n\n 1. describe objectives in backtesting an investment strategy;\n\n 2. describe and contrast steps and procedures in backtesting an investment strategy;\n\n 3. interpret metrics and visuals reported in a backtest of an investment strategy;\n\n 4. identify problems in a backtest of an investment strategy;\n\n 5. describe different ways to construct multifactor models;\n\n 6. compare methods of modeling randomness;\n\n 7. evaluate and interpret a scenario analysis;\n\n 8. contrast Monte Carlo and historical simulation;\n\n 9. explain inputs and decisions in simulation and interpret a simulation; and\n\n 10. demonstrate the use of sensitivity analysis.\n\n\nIn this reading, we have discussed how to perform rolling window backtesting—a widely used technique in the investment industry. Next, we described how to use scenario analysis and simulation along with sensitivity analysis to supplement backtesting, so investors can better account for the randomness in data that may not be fully captured by backtesting.\n\n • The main objective of backtesting is to understand the risk–return trade-off of an investment strategy, by approximating the real-life investment process.\n\n • The basic steps in a rolling window backtesting include specifying the investment hypothesis and goals, determining the rules and processes behind an investment strategy, forming an investment portfolio according to the rules, rebalancing the portfolio periodically, and computing the performance and risk profiles of the strategy.\n\n • In the rolling window backtesting methodology, researchers use a rolling window (or walk-forward) framework, fit/calibrate factors or trade signals based on the rolling window, rebalance the portfolio periodically, and then track the performance over time. Thus, rolling window backtesting is a proxy for actual investing.\n\n • There are two commonly used approaches in backtesting—long/short hedged portfolio and Spearman rank IC. The two approaches often give similar results, but results can be quite different at times. Choosing the right approach depends on the model building and portfolio construction process.\n\n • In assessing backtesting results, in addition to traditional performance measurements (e.g., Sharpe ratio, maximum drawdown), analysts need to take into account data coverage, return distribution, factor efficacy, factor turnover, and decay.\n\n • There are several behavioral issues in backtesting to which analysts need to pay particular attention, including survivorship bias and look-ahead bias.\n\n • Risk parity is a popular portfolio construction technique that takes into account the volatility of each factor (or asset) and the correlations of returns between all factors (or assets) to be combined in the portfolio. The objective is for each factor (or asset) to make an equal (hence “parity”) risk contribution to the overall or targeted risk of the portfolio.\n\n • Asset (and factor) returns are often negatively skewed and exhibit excess kurtosis (fat tails) and tail dependence compared with normal distribution. As a result, standard rolling window backtesting may not be able to fully account for the randomness in asset returns, particularly on downside risk.\n\n • Financial data often face structural breaks. Scenario analysis can help investors understand the performance of an investment strategy in different structural regimes.\n\n • Historical simulation is relatively straightforward to perform but shares pros and cons similar to those of rolling window backtesting. For example, a key assumption these methods share is that the distribution pattern from the historical data is sufficient to represent the uncertainty in the future. Bootstrapping (or random draws with replacement) is often used in historical simulation.\n\n • Monte Carlo simulation is a more sophisticated technique than historical simulation is. In Monte Carlo simulation, the most important decision is the choice of functional form of the statistical distribution of decision variables/return drivers. Multivariate normal distribution is often used in investment research, owing to its simplicity. However, a multivariate normal distribution cannot account for negative skewness and fat tails observed in factor and asset returns.\n\n • The Monte Carlo simulation technique makes use of the inverse transformation method—the process of converting a randomly generated uniformly distributed number into a simulated value of a random variable of a desired distribution.\n\n • Sensitivity analysis, a technique for exploring how a target variable and risk profiles are affected by changes in input variables, can further help investors understand the limitations of conventional Monte Carlo simulation (which typically assumes a multivariate normal distribution as a starting point). A multivariate skewed t-distribution takes into account skewness and kurtosis but requires estimation of more parameters and thus is more likely to suffer from larger estimation errors.", "pred_label": "__label__1", "pred_score_pos": 0.9622262716293335} {"content": "Problem: Give the formulas or names for the following compounds:sodium nitrate          ___________  CaSO 4    ___________________________sulfur hexaflouride   ___________  NH4NO3  ___________________________sodium chlorate       ___________  K2HPO4  ___________________________\n\nFREE Expert Solution\n90% (353 ratings)\nProblem Details\n\nGive the formulas or names for the following compounds:\n\nsodium nitrate          ___________  CaSO    ___________________________\nsulfur hexaflouride   ___________  NH4NO3  ___________________________\nsodium chlorate       ___________  K2HPO4  ___________________________\n\nFrequently Asked Questions\n\n\nOur tutors have indicated that to solve this problem you will need to apply the Writing Ionic Compounds concept. You can view video lessons to learn Writing Ionic Compounds. Or if you need more Writing Ionic Compounds practice, you can also practice Writing Ionic Compounds practice problems.\n\nWhat is the difficulty of this problem?\n\nOur tutors rated the difficulty ofGive the formulas or names for the following low difficulty.\n\nHow long does this problem take to solve?\n\nOur expert Chemistry tutor, Sabrina took 2 minutes and 55 seconds to solve this problem. You can follow their steps in the video explanation above.", "pred_label": "__label__1", "pred_score_pos": 0.9888791441917419} {"content": "Education and Awareness\n\nAccessibility standards and their functional implementation can seem overwhelming and lead to inaction, particularly for those without a technical background. \n\nWhile we want to continue to strive to eliminate all accessibility barriers, a focus on several core accessibility skills and knowledge will allow us to move towards a more inclusive and accessible digital environment. \n\nContent Editor Big Ideas\n\nYou need to start somewhere on the accessibility journey, and the Big Ideas are just the place.  Learn key concepts in digital accessibility, how they impact people with disabilities, and what you can do to begin to reduce barriers on your website, in your classes, and beyond.\n\nWeb Developer Big Ideas\n\nDeveloping an accessible website is a constant process that can sometimes require a great deal of expertise.  However, there are many concrete steps that most web developers can take to make their sites more accessible to all.\n\nEducation Opportunities\n\nTo assist staff, faculty, and students in meeting the responsibilities described in the EIT Accessibility Policy and Procedure, the university will make training and support readily available.\n\nUniversal Design\n\nAccording to the Center for Excellence in Universal Design, “Universal Design is the design and composition of an environment so that it can be accessed, understood and used to the greatest extent possible by all people regardless of their age, size, ability or disability.”  Learn more about the principles behind Universal Design and how that can be applied in the digital realm.", "pred_label": "__label__1", "pred_score_pos": 0.9999901652336121} {"content": "Walk In Trays\n\nWalk in shower trays are simply larger trays that are similar in size to a bath - so generally around 1700 x 700mm or 1700 x 800mm. Sometimes they have a draining area with integral grooves to allow the water to easily drain back to the waste area. You can pick your favourite glass shower screen panels and a walk in tray that matches your room sizes to create a bespoke walk in enclosure. Choose from a selection of walk in trays in acrylic, stone resin, slate and ceramic materials.", "pred_label": "__label__1", "pred_score_pos": 0.9855528473854065} {"content": "How does sleep duration affect the development of osteoporosis |\neMediNexus Coverage from: \nHow does sleep duration affect the development of osteoporosis\neMediNexus Editorial,  18 April 2020\nCoronavirus Live Count Map India\n\nremove_red_eye 1958 Views\nCOVID-19 Vaccine Updates\n\n\n3 Read Comments                \n\nThe American National Sleep Foundation recommends 7-9 hours of sleep per day for adults 18 years of age and older. There has been increasing amount of research into the association between osteoporosis and sleep.\n\nLonger sleep duration has been tied to increased risk of osteoporosis. A study by Chen and colleagues assessed the relationship between sleep, daytime nap duration, and osteoporosis. It was also investigated if they varied by sex, menopause, and sleep quality. The study included 8688 participants aged 40 years or above. Investigators noted that among postmenopausal women, risks of osteoporosis for sleep durations of 7–8 h/d, 9–10 h/d, and >10 h/d were 1.531 (1.106, 2.121), 1.360 (1.035, 1.787), and 1.569 (1.146, 2.149), respectively. The risks of osteoporosis for daytime nap durations of 30–60 min/d and longer than 60 min/d were 1.553 (1.212–1.989) and 1.645 (1.250–2.165), respectively.\n\nSleep durations of 7–8 h/d, 9–10 h/d, and >10 h/d, and longer daytime naps were therefore linked with higher risks of having osteoporosis. Higher frequency and longer duration of daytime napping were reported to be associated with lower femoral bone mineral density (BMD) in elderly women in a study published in Scientific Reports.\n\nShorter sleep duration, on the other hand, has also been linked with osteoporosis in postmenopausal women. A study published in the Journal of Bone and Mineral Research included 11,084 postmenopausal women from the Womens Health Initiative. Women with a sleep duration of ≤5 hours per night had significantly BMD compared to women who reported sleeping 7 hours per night. Adjusted multinomial models revealed that women with <5 hours of sleep per night had higher odds of low bone mass and osteoporosis of hip. Women sleeping ≤5 hours per night also had an increased risk for osteoporosis at the spine.\n\nAnother study has linked poor sleep quality with osteoporosis. Increased sleep disturbances seem to be a key factor in the association between poor sleep quality and osteoporosis.\n\nWang et al noted that both short and long sleep duration were associated with a significantly increased risk of osteoporosis in the middle-aged and elderly adults. The investigators noted a U-shaped dose-response relationship between sleep duration and risk of osteoporosis. The lowest risk was observed at a sleep duration of 8-9 h/day. In comparison with 8-h sleep duration per day, the pooled odds ratio for osteoporosis were found to be 1.03 for each 1-h reduction in individuals with shorter sleep duration and 1.01 for each 1-h increase in individuals with longer sleep duration.\n\nTherefore, appropriate sleep duration could play a role in delaying or preventing osteoporosis.\n\nTo comment on this article,\ncreate a free account.\nCreate Account\n\nAlready registered?\n\nLogin Now", "pred_label": "__label__1", "pred_score_pos": 0.9619139432907104} {"content": "Software Developer- Buna\n\nHiring UAE\nJob Position: Software Developer- Buna\nJob Description: Arab Monetary Fund - Abu Dhabi - Introduction As the implementation phase of Buna, formerly known as the Arab Regional Payment System (ARPS), project picks up momentum, we are looking for a responsible Software Developer to join our founding team. Duties of the Software Developer include designing, developing, testing, implementing, and maintaining Buna’s software platform and solutions. The job holder is also responsible for preparing training manuals, developing quality assurance procedures and staying up-to-date with the latest development tools & programming techniques. This position will report to Chief Technology Officer. In this context, the following sections detail the main qualifications, skills and responsibilities related to this position: Job Responsibilities Software Design and Development 1. Design software solutions and platforms and produce detailed specifications by analyzing business, functional and technical requirements and specifications 2. Develop and implement Buna software platform... - Permanent - Full-time\n\nApply here:\n\nNote: This advertisement for Software Developer- Buna maybe valid for limited time only from the date it was posted, so don't miss the chance and apply now!\n\n\n\nSarap king\n\nSoimai King Franchise: Contact Us", "pred_label": "__label__1", "pred_score_pos": 0.9327608942985535} {"content": "East Lansing, MI\n\nmap preview\nPlease wait, loading your map...\n\nEast Lansing profile\n\nLiving in East Lansing\n\nEast Lansing is a medium-sized city located in the state of Michigan. With a population of 48,145 people and 21 constituent neighborhoods, East Lansing is the 31st largest community in Michigan.\n\nEast Lansing is a decidedly white-collar city, with fully 90.45% of the workforce employed in white-collar jobs, well above the national average. Overall, East Lansing is a city of professionals, sales and office workers, and service providers. There are especially a lot of people living in East Lansing who work in teaching (14.75%), office and administrative support (12.30%), and food service (11.38%).\n\nAlso of interest is that East Lansing has more people living here who work in computers and math than 95% of the places in the US.\n\nIn addition, East Lansing is a major college town that has a very high percentage of its residents over 18 years old who are college students. Naturally, collegiate life has a major influence on local East Lansing culture, lifestyle and entertainment options. East Lansing really pulses to the beat of the academic calendar. In East Lansing every fall, returning students reinvigorate the community, who you will notice are all over town, buying groceries, out with friends, and getting acquainted or re-acquainted with each other and East Lansing. One of the beneficial effects that colleges provide is that they tend to be lasting institutions that deliver direct economic benefits to the local economy in the form of such things as jobs for faculty and staff, and spending by students. East Lansing benefits directly from this.\n\n\nResidents of the city have the good fortune of having one of the shortest daily commutes compared to the rest of the country. On average, they spend only 18.47 minutes getting to work every day.\n\nLike elsewhere in America, most people in East Lansing use a private automobile to get to work. But notably, a substantial number of East Lansing‘s citizens do make use of public transit in their daily commute, primarily riding the bus. This helps more people get to work with less air pollution, and require fewer highways to get them there.\n\nIf knowledge is power, East Lansing is a pretty powerful place. 58.15% of the adults in East Lansing have earned a 4-year college degree, masters degree, MD, law degree, or even PhD. Compare that to the national average of 21.84% for all cities and towns.\n\nThe per capita income in East Lansing in 2018 was $26,362, which is middle income relative to Michigan and the nation. This equates to an annual income of $105,448 for a family of four. However, East Lansing contains both very wealthy and poor people as well.\n\nEast Lansing is a very ethnically-diverse city. The people who call East Lansing home describe themselves as belonging to a variety of racial and ethnic groups. The greatest number of East Lansing residents report their race to be White, followed by Asian. Important ancestries of people in East Lansing include German, Irish, English, Polish, and Italian.\n\nThe most common language spoken in East Lansing is English. Other important languages spoken here include Chinese and Spanish.", "pred_label": "__label__1", "pred_score_pos": 0.5565593242645264} {"content": "An overwhelming majority of affluent individual investors in the US, predominantly millennials, are now keen to embrace sustainable investing strategies.\n\nThe findings are from a study by Morgan Stanley, which surveyed 800 US individual investors with at least $100,000 in investable assets.\n\nEighty-five percent of these investors cited that they are interested in sustainable investing, while 52% said that they have already participated in one such activity.\n\nThe interest for such strategies was more pronounced in millennials, referred to as people aged between 18 and 37 years.\n\nAmong the millennials, 95% were found interested in sustainable investing while 67% said they already participated in one such activity.\n\nOverall, 86% of the respondents believed that corporate ESG practices can boost profit margins and serve as better long-term investments.\n\nOf the investors polled, 84% also expressed willingness to tailor their investments to their impact goals. The same was cited by 90% of the millennials.\n\nMoreover, 84% of the investors wanted to track the impact return on their investments. This figure too was higher among millennials at 90%.\n\nHowever, 65% of the investors found a lack of more financial product options as an impediment to adopting sustainable investing.\n\nMorgan Stanley chief sustainability officer and chief marketing officer Audrey Choi said: “These findings reaffirm that sustainable investing has entered the mainstream and is here to stay.\n\n“Increasingly, investors want to know what they own and want those holdings to reflect their values.”", "pred_label": "__label__1", "pred_score_pos": 0.7951869368553162} {"content": "Articles, Analysis,\nand Commentary\n\nHow Are Damages Calculated In Personal Injury Cases In Maryland?\n\nCompensation is based on monetary and non-monetary factors.\n\n\n\nMaryland recognizes two classes of damage that are applicable to personal injury cases. On the one hand, you have economic damages and these are things like lost wages and the payment of medical expenses, perhaps some out of pocket expenses and those are frankly easily tabulated and calculated. What is more complicated is the concept of non-economic damages. Now, a jury is given an instruction of various factors they can consider when reaching their conclusions and in their deliberations about what proper compensation for non-economic damages should be. Included here are things like distress, anguish, physical pain, emotional pain. In short and what I've often argued to juries is the ways in which the injury sustained in an accident disrupts the normal flow and course of someone's life.\n\n\nEric T Kirk\n\nAfter graduating with honors from Albany Law School in New York, Eric Kirk has spent most of his 25 year legal career battling insurance companies to secure fair and just compensation for his clients in Maryland, New York, and Florida.", "pred_label": "__label__1", "pred_score_pos": 0.912055492401123} {"content": "The Goals of Criminal Justice: Doing justice, controlling crime, and preventing crime\n\nEssay by arikun June 2007\n\ndownload word file, 3 pages 4.2\n\nDownloaded 163 times\n\nCriminal justice is the branch of law that deals with disputes or actions involving criminal penalties. It regulates the conduct of individuals, defines crimes, and provides punishment for criminal acts. More so, it means activities relating to the detection, apprehension, detention, pretrial release, post trial release, prosecution, adjudication, correctional supervision or rehabilitation of accused persons or criminal offenders. Also, the administration of criminal justice includes criminal identification activities and the collection, storage and dissemination of criminal history records.\n\n\"The criminal justice system is purposive of delivering justice for all, by convicting and punishing the guilty and helping them to stop offending, while protecting the innocent. It is responsible for detecting crime and bringing it to justice; and carrying out the orders of court, such as collecting fines, and supervising community and custodial punishment\" (Garland, 2002). The key goals for the criminal justice system are to help reduce crime by bringing more offences to justice, and to raise public confidence that the system is fair and will deliver for the law-abiding citizen.\n\nThat includes increasing the satisfaction of victims and witnesses with the treatment they receive. Together with other partners, the criminal justice system works to prevent crime from happening in the first place, to meet the wider needs of victims, and to help turn offenders away from crime.\n\nThe National Criminal Justice Board has agreed a vision for the criminal justice system, which describes what the system will look like in the following years. Firstly, this system envisions that the public develop confidence on its being effective in serving all communities fairly. Also, it envisions for the victims and witnesses to receive a consistent high standard of service from all criminal justice agencies. It also wants to bring more offences to justice through a more modern and efficient justice process...", "pred_label": "__label__1", "pred_score_pos": 0.9488016963005066} {"content": "Question: What Is The Best Temperature To Cook Fish In The Oven?\n\nWhat is the healthiest way to cook a fish?\n\nHealthiest Ways to Cook FishSteaming.\n\nSteaming fish doesn’t dry it out or require added fat.\n\n\nPoaching is most effective with firm fish fillets.\n\n\nSalmon is a top choice for broiling.\n\n\nGrill your fish on a wooden plank for more flavor.\n\n\nThe simplest method to cook fish is baking..\n\nIs undercooked fish dangerous?\n\nFor most healthy people who choose to eat raw or undercooked seafood, it may only pose a small health risk but for others the risk can be severe. … Major types of food poisoning that can result from eating raw or undercooked fish and shellfish include Salmonella and Vibrio vulnificus.\n\nCan you bake fish in an aluminum pan?\n\nLarger pieces or whole fish can be set into a roasting pan or rimmed baking sheet that has been first lightly oiled, pan-sprayed or lined with aluminum foil. … Measure the thickness of the fish at its thickest point. Cook in a preheated 450-degree oven, about 12 minutes per inch of thickness for fillets and steaks.\n\nHow long does salmon take to cook at 180 degrees?\n\n\nAt what temp should Salmon be cooked?\n\n\nHow do you know when fish is done?\n\n\nWhat temperature should fish?\n\nSafe Minimum Cooking Temperatures ChartsFoodTypeInternal Temperature (°F)SeafoodFish with fins145 or cook until flesh is opaque and separates easily with a forkShrimp, lobster, crab, and scallopsCook until flesh is pearly or white, and opaqueClams, oysters, musselsCook until shells open during cooking9 more rows•Apr 12, 2019\n\nDoes cooking in foil take longer?\n\n\nHow long do I bake frozen fish?\n\n\nHow do you know when baked salmon is done?\n\n\nHow long does it take to bake fish at 450?\n\n\nWHat is the 10 minute rule for cooking fish?\n\n\nCan you overcook fish?\n\n\nIs it better to bake or pan fry salmon?\n\n\nDo you turn fish oven when baking?\n\nThe general rule with fish baking is to bake the fish for 10 minutes for every inch of its thickness. 450F is a suitable temperature for most baked fish recipes. Unless the fish is an inch or less thick, you should turn it half way through the cooking time.\n\nWhat temperature should oil be to cook fish?\n\n\nIs it better to bake fish covered or uncovered?\n", "pred_label": "__label__1", "pred_score_pos": 0.9994097948074341} {"content": "Tuesday, December 12, 2017\n\nSeven charts that explain the plastic pollution problem\n\nDr Lucy Quinn from the British Antarctic Survey looks at plastic ingested by albatross.\n\nFrom BBC by Alison Trowsdale, Tom Housden and Becca Meier.\nDesign by Sue Bridge and Joy Roxas.\n\nMarine life is facing \"irreparable damage\" from the millions of tonnes of plastic waste which ends up in the oceans each year, the United Nations has warned.\n\n\nBut how does this happen, where is most at risk and what damage does this plastic actually do?\n\nWhy is plastic problematic?\n\n\nIn July a paper published in the journal Science Advances by industrial ecologist Dr Roland Geyer, from the University of California in Santa Barbara, and colleagues, calculated the total volume of all plastic ever produced at 8.3bn tonnes.\nThis vast amount of waste has been driven by modern life, where plastic is used for many throwaway or \"single use\" items, from drinks bottles and nappies to cutlery and cotton buds.\n\nFour billion plastic bottles...\n\nDrinks bottles are one the most common types of plastic waste. Some 480bn plastic bottles were sold globally in 2016 - that's a million bottles per minute.\nOf these, 110bn were made by drinks giant Coca Cola.\n\nSome countries are considering moves to reduce consumption.\n\nProposals in the UK include deposit-return schemes, and the improvement of free-drinking water supplies in major cities, including London.\nSo how much plastic waste ends up in the sea?\n\nIt's likely that about 10m tonnes of plastic currently ends up in the oceans each year.\n\n\n\nChina was top of the list of countries mismanaging plastic waste, but the US also featured in the top 20 and contributed a higher rate of waste per person.\nPlastic waste accumulates in areas of the ocean where winds create swirling circular currents, known as gyres, which suck in any floating debris.\nThere are five gyres around the globe, but the best known is probably the North Pacific gyre.\nIt is estimated debris takes about six years to reach the centre of the North Pacific gyre from the coast of the US, and about a year from Japan.\nAll five gyres have higher concentrations of plastic rubbish than other parts of the oceans.\nThey are made up of tiny fragments of plastic, which appear to hang suspended below the surface - a phenomenon that has led it to being described as plastic soup.\nAnd the hard-wearing qualities of most plastics means that some items can take hundreds of years to biodegrade.\nHowever, there are moves to clean up the North Pacific gyre.\nAn operation led by a non-profit organisation Ocean Cleanup is due to begin in 2018.\n\nHow bad are things in the UK?\n\nThe Marine Conservation Society found 718 pieces of litter for every 100m stretch of beach surveyed during their recent Great British Beach Clean Up.\nThat was a 10% increase on last year.\n\nRubbish from food and drink constituted at least 20% of all litter collected, the MCS reported.\nThe origin of a lot of the litter is difficult to trace, but the public contributes about 30%.\n\"Sewage-related debris\", or items flushed down toilets that should have been put in the bin, amounted to some 8.5%.\n\nWhy is plastic so harmful to marine life?\nFor sea birds and larger marine creatures like turtles, dolphins and seals, the danger comes from being entangled in plastic bags and other debris, or mistaking plastic for food.\nTurtles cannot distinguish between plastic bags and jellyfish, which can be part of their diet.\nPlastic bags, once consumed, cause internal blockages and usually result in death.\nLarger pieces of plastic can also damage the digestive systems of sea birds and whales, and can be potentially fatal.\nOver time, plastic waste slowly degrades and breaks down into tiny micro-fragments which are also causing scientists concern.\n\nBut in 2016 the European Food Safety Authority warned of an increased risk to human health and food safety \"given the potential for micro-plastic pollution in edible tissues of commercial fish\".\n\nLinks :", "pred_label": "__label__1", "pred_score_pos": 0.6689297556877136} {"content": "data scalar create command\n\n\ndata scalar create v ...\n\nPrimary keywords:\n\nextra    group    value\n\nCreate a scalar data entry. Scalars are an internal list of user-defined objects that have the position v and the value f (assigned via the value keyword) associated with them. Scalars may also have groups and extra variables assigned to them upon creation.\n\nScalar fields can be visualized with the user interface. Scalars can be used to track events in the model, or to compare model results against external data.\n\nextra i a\n\nOptionally assign the extra variable a to index i.\n\ngroup s \n\nOptionally assign the group name s to slot s2. By default, s2 = Default. Use of the group logic is described in the topic Group.\n\nvalue f\n\nAssign f to be the value associated with the scalar.", "pred_label": "__label__1", "pred_score_pos": 0.7642291784286499} {"content": "Question: What Factors Contribute To Job Satisfaction Ielts?\n\nHow important is salary to job satisfaction?\n\nYes, good wages can lead to job satisfaction and earning enough to make a living is important, but they aren’t the only reason employees find satisfaction in their jobs.\n\nIt’s important to pursue a field that gives you personal happiness because if you can obtain a good pay, but you are not happy, then there’s no point..\n\nWhat 3 things do you need in a job to be satisfied?\n\nAt the center of the flywheel, you’ll find the central values: purpose, worthwhile work and making a difference….3 Things Employees Need to Feel Satisfied:They want to believe the organization has the right purpose. … They want to know they are doing worthwhile work. … Employees want to make a difference.\n\nHow realistic is the expectation of job satisfaction for all employees?\n\nThere are several factors that contribute to job satisfaction. … However, every person has a different motivation for doing a job hence it is not realistic for everyone to feel satisfied with their jobs. This is because people’s expectations from their employers are usually much higher.\n\nIs job satisfaction the most important part of an individual’s work life?\n\nJob satisfaction is a very important part of an employee’s lifecycle and motivation to remain loyal to and employed with an organization. A number of activities or tasks of an HR team directly or indirectly influence employee satisfaction levels.\n\nWhat are the five components of job satisfaction?\n\nTypes of Job Satisfaction Components Different surveys provide different categories for respondents to rate their job satisfaction such as the CNBC survey, which included five components of job satisfaction: pay, opportunities for advancement, recognition, autonomy and meaning.\n\nWhat are types of job satisfaction?\n\nThere are three dimensions of overall job satisfaction which includes general satisfaction, internal work motivation and growth satisfaction, which are combined into a single measure. The facets which are measured on the survey include security, compensation, co-workers and supervision (Fields, 2002, p. 20).\n\nWhat are the factors that contribute to job satisfaction?\n\nThe top 10 factors are:Appreciation for your work.Good relationships with colleagues.Good work-life balance.Good relationships with superiors.Company’s financial stability.Learning and career development.Job security.Attractive fixed salary.More items…•\n\nWhich is more important job satisfaction or good salary essay?\n\nSome people choose high paying jobs. Others prefer jobs they find satisfying even if the salary is low. While I admit that it is important to earn enough to make a living, in my opinion, job satisfaction is more important than the size of the pay package. Job satisfaction increases productivity.\n\nWhat are the five major factors involved in job satisfaction?\n\nThe study found that employees identified these five factors as most important:Job security.Benefits (especially health care) with the importance of retirement benefits rising with the age of the employee.Compensation.Opportunities to use skills and abilities.Feeling safe in the work environment.\n\nHow do you achieve job satisfaction?\n\n13 Tips For Improving Job SatisfactionWork on The Culture. … Establish Trust with Senior Management. … Expand job benefits. … Offer competitive compensation. … Foster job security. … Strengthen employee relationships. … Focus on employee engagement. … Provide opportunities for career advancement.More items…•", "pred_label": "__label__1", "pred_score_pos": 0.9999891519546509} {"content": "Question: What Is The Verb Form Of General?\n\nWhat are the 20 verbs?\n\n100 Most Common English Verbs ListNo.VerbPast Participle17to givegiven18to telltold19to workworked20to callcalled21 more rows.\n\nHow can I learn verb form in English?\n\nThe 8 Top Tricks for Remembering Irregular English VerbsGroup common irregular verbs together. … Learn all new vocabulary with its tense forms. … Memorize the 10 most common irregular verbs first. … Turn memorizing into a game. … Learn in sentences. … Learn with songs. … Leave lists where you can see them. … Ask people to correct you.\n\nIs the word could a verb?\n\n\nWhat is verb and its forms?\n\nVerbs are words that express action or state of being. There are three types of verbs: action verbs, linking verbs, and helping verbs. Action Verbs. Action verbs are words that express action (give, eat, walk, etc.) or possession (have, own, etc.). Action verbs can be either transitive or intransitive.\n\nWhat is the noun of high?\n\nnoun. /haɪ/ level/number. the highest level or number Profits reached an all-time high last year.\n\nIs had a verb?\n\n\nIs could a adverb?\n\nAn adverb describes, modifies, or provides more information about a verb in a sentence. … Adverbs can be confused with adjectives, which also modify things. However, adjectives modify nouns and pronouns. If you said “I have a nice dog,” then “dog” is the noun which is being modified by the adjective “nice”.\n\nHow do you define availability?\n\nAvailability is the probability that an item will be in an operable and committable state at the start of a mission when the mission is called for at a random time, and is generally defined as uptime divided by total time (uptime plus downtime).\n\nWhat is v1 v2 v3 v4 v5?\n\nAnswer: v1 is present ,v2 past ,v3 past participate ,v4 present participate, v5 simple present.\n\nWhat’s a synonym for high?\n\nSYNONYMS. tall, lofty, towering, soaring, elevated, giant, big. multistorey, high-rise, sky-scraping.\n\nWhat does general use mean?\n\n: suitable to be used for two or more basic purposes.\n\nWhat’s the meaning of in general?\n\nphrase. You use in general to indicate that you are talking about something as a whole, rather than about part of it. I think we need to improve our educational system in general. Synonyms: as a whole, generally, overall, altogether More Synonyms of in general.\n\nCan and could grammar?\n\n\nWhat is another word for availability?\n\nIn this page you can discover 23 synonyms, antonyms, idiomatic expressions, and related words for availability, like: accessibility, inherence, hereness, unavailability, delivery, pricing, usage, distribution, availableness, thereness and utilizability.\n\nIs high a noun or verb?\n\nhigh (adverb) high (noun) high–class (adjective) high–definition (adjective)\n\nWhat is general word?\n\nof or relating to all persons or things belonging to a group or category: a general meeting of the employees. of, relating to, or true of such persons or things in the main, with possible exceptions; common to most; prevalent; usual: the general mood of the people.\n\nHow do you spell availability?\n\nCorrect spelling for the English word “availability” is [ɐvˌe͡ɪləbˈɪlɪti], [ɐvˌe‍ɪləbˈɪlɪti], [ɐ_v_ˌeɪ_l_ə_b_ˈɪ_l_ɪ_t_i] (IPA phonetic alphabet).\n\nWhat means availability?\n\n1 : the quality or state of being available trying to improve the availability of affordable housing. 2 : an available person or thing.\n\nHow many regular verbs are there in English?\n\n130 common regular verbsRegular Verbs in English! Learn the definition and a list of over 130 common regular verbs in English.\n\nWhat is the verb form of available?\n\n\nWhat is the noun form of general?\n\ngeneral ​Definitions and Synonyms ​‌‌ ​noun countable. UK /ˈdʒen(ə)rəl/ Other entries for this word. + general adjective.\n\nWhat are the 3 forms of verbs?\n\nThere are 3 forms of verbPresent.Past.Past Participle.\n\nWhat is the verb for high?\n\n\nWhat are the 5 verb forms?\n", "pred_label": "__label__1", "pred_score_pos": 0.9994041919708252} {"content": "Quick Answer: Why Are My Graphics Drivers Failing To Install?\n\nHow do I install a WLAN driver?\n\nOpen the Device Manager (You can do this by pressing the Windows but and typing it out) Right click on your wireless adapter and choose Update Driver Software.\n\nChoose the option to Browse and locate the drivers you downloaded.\n\nWindows will then install the drivers..\n\nHow do I enable Intel HD graphics?\n\n\nWhy can’t I install Intel HD graphics driver?\n\nWhen installing the Intel graphics driver, it may fail to install. The most common reason is that the hardware is not supported. … Download the appropriate drivers from Dell.com/Support/Drivers and extract the file (Figure 1). Instead of installing the driver to a new folder.\n\nHow do you fix Nvidia installer errors is not compatible and could not find compatible graphics?\n\nSteps to Fix Nvidia Graphics Driver cannot find compatible graphics hardware Issue:Get your device ID: click on CONTROL PANEL, then CLICK on SYSTEM, then CLICK on DEVICE MANAGER.Under Other Devices/ (or if your video card already has a driver under Display Adapter) click on Video Adapter.More items…\n\nHow do I fix my Intel HD graphics?\n\nRestart the computer. Right-click the start menu and go to Device Manager. Click Display Adapters. Right-click the Intel® HD Graphics Adapter and click Update Driver.\n\nWhat happens if I don’t update my graphics driver?\n\n\nHow do I update my graphics driver?\n\n\nHow do I manually install a driver?\n\n\nHow do I install missing drivers?\n\nRight-click on any device that has an error and click “Update Driver Software.” Select “Search automatically for updated driver software.” Windows will search for the best applicable drivers and install them for you. Click “OK” when the drivers are found to allow Windows to complete the install.\n\nWhy can’t Nvidia installer continue?\n\nTo upgrade NVIDIA Graphics Card Driver Manually to fix the NVIDIA Installer Cannot Continue error, first of all, you will need to download the latest compatible driver for your graphics card on your computer. … Now, right click on the NVIDIA Graphics Card option from the expanded list, then click on Update driver option.\n\nWhy is my graphics card not being detected?\n\nSometimes the ‘Graphics card not detected’ error will occur upon the installation of new drivers when something goes awry. Be it a faulty driver on its own or new drivers’ incompatibility with another component inside the PC, the options are too numerous to name.\n\nDo I have the latest Nvidia drivers?\n\n\nWhy can’t I update my Nvidia driver on Windows 10?\n\nGo to Start -> Settings -> Update & security, then Check for updates and install any available updates. … If you have an nVidia, AMD ATI video card or Intel HD graphics installed, you can download the latest drivers from their website.\n\nWhy can’t I download Nvidia drivers?\n\n\nHow do I force a graphics driver to install?\n\nmsc”, and press Enter. Expand the “Display adapters” section in the Device Manager, right-click the “Intel(R) HD Graphics” device, and select “Properties”. Click the “Driver” tab in the properties window and click the “Update Driver” button. Click “Browse my computer for driver software” here.", "pred_label": "__label__1", "pred_score_pos": 0.5838589668273926} {"content": "How do Buddhists handle coronavirus? The answer is not just meditation\n\nHow do Buddhists handle coronavirus? The answer is not just meditation\n\nMillions of Buddhists seeking protection and healing from the novel coronavirus are turning to traditional religious rituals.\n\nSince the emergence of COVID-19, the Dalai Lama, other senior monks and Buddhist organizations in Asia and worldwide have emphasized that this pandemic calls for meditation, compassion, generosity and gratitude. Such messages reinforce a common view in the West of Buddhism as more philosophy than religion—a spiritual, perhaps, but secular practice associated with mindfulness, happiness and stress reduction.\n\nBut for many people around the world Buddhism is a religion—a belief system that includes strong faith in supernatural powers. As such, Buddhism has a large repertoire of healing rituals that go well beyond meditation.\n\nHaving studied the interplay between Buddhism and medicine as a historian and ethnographer for the past 25 years, I have been documenting the role these ritual practices play in the coronavirus pandemic.\n\nTalismans, prayer and ritual\n\nBuddhism originated in India about two and a half millennia ago. Today, with well over a half-billion adherents across the world, it is a highly diverse tradition that has adapted to many cultural and social contexts.\n\nThere are three main schools of traditional Buddhism: Theravāda, practiced in most of Southeast Asia; Mahāyāna, the form most prevalent in East Asia; and Vajrayāna, commonly associated with Tibet and the Himalayan region.\n\nIn Buddhist-majority places, the official COVID-19 pandemic response includes conventional emergency health and sanitation measures like recommending face masks, hand-washing and stay-at-home orders. But within religious communities, Buddhist leaders also are using a range of ritual apotropaics—magical protection rites—to protect against disease.\n\nIn Thailand, for example, Theravāda temples are handing out “yant,” talismans bearing images of spirits, sacred syllables and Buddhist symbols. These blessed orange papers are a common ritual object among Buddhists in Southeast Asia who see crises such as epidemic illnesses as a sign that demonic forces are on the rise.\n\nTheravāda amulets and charms trace their magical powers to repel evil spirits not only to the Buddha but also to beneficial nature spirits, demigods, charismatic monks and wizards.\n\nNow, these blessed objects are being specifically formulated with the intention of protecting people from contracting the coronavirus.\n\nMahāyāna Buddhists use similar sacred objects, but they also pray to a whole pantheon of buddhas and bodhisattvas—another class of enlightened beings—for protection. In Japan, for example, Buddhist organizations have been conducting expulsion rites that call on Buddhist deities to help rid the land of the coronavirus.\n\nMahāyāna practitioners have faith that the blessings bestowed by these deities can be transmitted through statues or images. In a modern twist on this ancient belief, a priest affiliated with the Tōdaiji temple in Nara, Japan, in April tweeted a photo of the great Vairocana Buddha. He said the image would protect all who lay eyes upon it.\n\nThe third major form of Buddhism, Vajrayāna, which developed in the medieval period and is widely influential in Tibet, incorporates many rituals of earlier traditions. For example, the Dalai Lama has urged practitioners in Tibet and China to chant mantras to the bodhisattva Tārā, a female goddess associated with compassion and well-being, to gain her protection.\n\nVajrayāna practitioners also advocate a unique form of visualization where the practitioner generates a vivid mental image of a deity and then interacts with them on the level of subtle energy. Responses to COVID-19 suggested by leading figures in traditional Tibetan medicine frequently involve this kind of visualization practice.\n\nBuddhist modernism\n\nSince the height of the colonial period in the 19th century, “Buddhist modernists” have carefully constructed an international image of Buddhism as a philosophy or a psychology. In emphasizing its compatibility with empiricism and scientific objectivity they have ensured Buddhism’s place in the modern world and paved the way for its popularity outside of Asia.\n\nMany of these secular-minded Buddhists have dismissed rituals and other aspects of traditional Buddhism as “hocus pocus” lurking on the fringes of the tradition.\n\nHaving documented the richness of the history and contemporary practice of Buddhist healing and protective rituals, however, I argue that these practices cannot be written off quite so easily.\n\nIn most living traditions of Buddhism, protective and healing rituals are taken seriously. They have sophisticated doctrinal justifications that often focus on the healing power of belief.\n\nIncreasingly, researchers are agreeing that faith in itself plays a role in promoting health. The anthropologist Daniel Moerman, for example, has identified what he calls the “meaning response.” This model accounts for how cultural and social beliefs and practices lead to “real improvements in human well-being.” Likewise, Harvard Medical School researcher Ted Kaptchuk has studied the neurobiological mechanisms for how rituals work to alleviate illnesses.\n\nSource: Read Full Article", "pred_label": "__label__1", "pred_score_pos": 0.9873376488685608} {"content": "By: Bruce Buchanan, Sebelist Buchanan Law\n\nOffice of Chief Administrative Hearing Officer (OCAHO) was incredibly quiet in calendar year 2017 issuing only 5 substantive decisions against employers in I-9 penalty cases. Why so few decisions? Did employers stop committing any I-9 violations? Did employers stop appealing decisions by Immigration and Customs Enforcement (ICE)? The answer to both questions is no.\n\nThe answer is that there has been such turnover of Administrative Law Judges (ALJs) at OCAHO that very few cases have been heard by OCAHO. In 2016, ALJ Ellen K. Thomas retired and ALJ Stacy Paddack transferred to another agency after less than two years at OCAHO. In late 2016, James McHenry was named an OCAHO ALJ. However, his tenure was short-lived as less than six months later, he was named Acting Director of EOIR and in January 2018, he became the permanent Director of EOIR. So, after ALJ McHenry issued four OCAHO I-9-related decisions in first five months of 2017, only one such decision issued the rest of 2017. In the last nine months, ALJs have been “detailed from other agencies.\n\nThe rest of my 2017 yearly review will be published by LawLogix in the coming weeks. So, look for it there.", "pred_label": "__label__1", "pred_score_pos": 0.9994267225265503} {"content": "Will Nigeria generate more than $6 billion through blockchain by 2030?\n\n\nBy Giorgi Mikhelidze - 28 Nov 2020\n\nChevron down\n\nNigeria is one of those African nations that try hard to take part in the blockchain and crypto adoption process. \n\nAs cryptos continue to become more and more popular as payment transactions around the world, Nigeria contributes a lot to expand its market and remain the biggest crypto market in the world. \n\nBut if until now the market was slowly emerging and no big step was taken in order to raise the market, recently Nigeria announced that they target to generate $10 billion in revenue using blockchain technology and they hope to achieve this goal by 2030. \n\nAs it’s reported the National Information Technology Development Agency (NITDA) wants Nigeria to use the whole potential of blockchain and gain as much as possible. According to the general director of NITDA, there’s the possibility of revenue between $6-10 billion in the next ten years when taking the current circumstances of the country into account. \n\nSpecifically, the operation of blockchain technology is pretty beneficial for the country nowadays and this decentralized ledger technology has the potential to boost the Nigerian economy. \n\nDoes blockchain make the Nigerian economy grow?\n\nIt has already been several months since the Nigerian government realized that if the country wants to stimulate economic growth, they have to start thinking about diversifying the economy. \n\nThroughout the years, most parts of the economy of Nigeria was strongly dependent on the crude oil industry. In fact, oil makes about 10% of the GDP and 70% of the government revenue as it’s said in the latest report of the Organization of the Petroleum Exporting Countries (OPEC). Besides, more than 80% of the export is made by the oil industry. \n\nHowever, Nigeria banked hard on having its financial sector as a safety net besides its oil industry. One of the sectors that have played a significant role in boosting the economy is forex trading. But, even though trading volumes have increased with Nigerian forex trading companies specifically, it’s still not nearly enough to keep the economy floating. Forex exchange trading is legal in Nigeria and regulated by the Central Bank of Nigeria and today more and more people are joining the market because of the consequent benefits but it’s not the main reason for the success of the Nigerian economy. \n\nNigeria is at the forefront of the leader crypto places today. There are tons of crypto companies in this country and there are even more of them that aim to start investing in Nigeria. In fact, most of the “trading volume” already belongs to cryptos, so betting on its success is probably the safest route this African nation can take at the moment. And considering the fact that investments in blockchain technology rise at a rapid speed, predictions about the revenue to increase so much to make no less than $10 billion in ten years, seems pretty reasonable. \n\nGlobal image \n\nBefore the National Information Technology Development Agency (NITDA) actually fulfills its aim, there are still ten years and a lot can change during this time. Just a year ago no one could have imagined that the world would face anything like the pandemic. So anything can change before 2030 but for now, the success of bitcoin and cryptocurrencies, in general, is so obvious in Nigeria and the whole world that it’s highly unlikely that something can really harm this digital currency. \n\nEven studies show that because of its wide range of use blockchain has the potential to add $1.76 trillion to the global gross domestic product and it will be about 1.4% of the global GDP in the next ten years. Probably, Nigeria will play a major role in the global image of blockchain’s success, and for this, the country should use its provincial services, digital identity, payment services, customer engagement, and also, the discussion on the resolution applications is needed. \n\nTherefore, blockchain will play a major role in creating various products and services in Nigeria, taking a huge part in the Nigerian and worldwide economy. It’s important to mention that according to Arcane Research Nigeria had the second-highest rate of crypto-ownership, as well as the usage of crypto among the internet users in the whole of Africa. In fact,  11% of the population uses blockchain which is a great amount. \n\nFinally, we can certainly say that Nigeria actually has the potential to generate up to $10 billion using blockchain technology by 2030 but many things have to be taken into account for achieving this success. If Nigeria truly adopts the technology, then it must be regulated to avoid fraudsters like abuse by Ponzi schemes and other malicious technologies that usually harm financial platforms. \n\nAs the director of the NITDA believes, if stakeholders contribute to the adoption process, it would be easier for the country to adopt blockchain. He mentioned that other benefits related to using blockchain technology would be reduced budgeting cost, ensured security, and increased globalization. Also, blockchain would definitely create more jobs and provide new opportunities for businesses, as well as ensuring transparency in the governance process. However, it’s vitally important for the adoption of blockchain to develop a legal framework and avoid possible dangers. That way it will be guaranteed that the country operates using a common global standard.\n\nGiorgi Mikhelidze\nGiorgi Mikhelidze\n\nGiorgi is a Georgia software developer with two years of experience trading on the financial markets. He is now working to spread the knowledge about the Blockchain in his country and share all of his findings and research to as many crypto enthusiasts as possible.\n", "pred_label": "__label__1", "pred_score_pos": 0.504558801651001} {"content": "The Preschool Paradigm\n\nNo, I didn’t send my son to Preschool. Yes, I am still a good Mom.\n\nRemember that time I promised you more posts on mom-shaming? Yeah, well I was serious about that and here it goes. Yes, this is a mini rant, but I promise it’ll be worth reading.\n\nLadies, I’m over it. I am so sick and tired of people’s reactions and judgement when they learn that my son did not attend preschool before he started Kindergarten. No matter where I am or who I am discussing this with, the moment I bring up the fact that my oldest son did not attend preschool, the general reaction is always shock and surprise with varying amounts of disapproval. Please, someone enlighten me. Why is this a thing?\n\nYes, I am well aware that most people send their children to a year or maybe even two of preschool but this should not mean that if I choose not to send my kid, that I should automatically be seen in a negative light. Why does the fact that I kept my son home with me mean that I’m a bad mother? Why do people treat me like I’ve done a disservice to him?\n\nIf you sent your child to preschool because that’s what was best for your family, then I am proud of you and applaud you for making that choice. I should receive the same type of judgement (or non-judgement in this case). Instead of being made to feel ashamed, embarrassed and like a failure, I should receive the same agreement, encouragement and praise that those that send their kids to preschool do.\n\nWhen I first started getting reactions like this, I would find myself embarrassed and would try to explain the reason why I kept my son home. Even now as I type this, I feel like I should be explaining to you why I kept him home. I yearned for understanding and wanted others to see my reasoning so they would approve of my actions. As I explained, some people were just politely nodding along but I could tell they thought I had made some grave mistake.\n\nBut you know what? I am so done feeling shame over this. There is nothing to be ashamed of. I have my reasons for keeping him home and I shouldn’t have to explain myself to anyone (other than God and my husband!). And I don’t feel embarrassed anymore; I feel anger, frustration and sadness. Sadness that our society has made it commonplace for one mother to judge and cause feelings of shame to arise in another mother like this.\n\nMom-shaming another mama for any reason only causes a further divide among moms. God knows how hard being a parent is and we need all the support, love and understanding we can get to make it through. Why would we normalize actions that further divide us all?\n\nYou guys, we are all just doing the best we can do as we navigate through motherhood. We each have the heavy task of making the best decisions possible for our family unit. I’m not sure if ya’ll noticed, but all of our families are different. Why would we be expected to make all of the exact same decisions for different families?\n\nHere’s my request of you all: First, stop feeling shamed or condemned for your decisions. YOU are the mom. Choose what’s best for your family and make those decisions proudly. Second, stop looking at other mom’s decisions and judging them. Let’s give fellow mothers the benefit of the doubt that they’re making the best decision possible for their family, regardless of us understanding why or not. Let’s support one another and offer understanding and encouragement. Let’s unite the moms!\n\nNo, I didn’t send my son to preschool and yes, I am a good mom.\n\nThe Preschool Paradigm", "pred_label": "__label__1", "pred_score_pos": 0.7666699886322021} {"content": "Suddenly you notice the person you’ve been living with chews with their mouth open\n\nWhile a certain amount of conflict is inevitable in relationships, the Covid-19 pandemic has exacerbated matters, experts say. The Coronovirus has meant that partners across the world have less time and money and are dealing with an unprecedented amount of chaos and uncertainty.\n\nMichael Kallenbach featured in the Saturday Star, June 20 2020.\n\n× Do get in touch...", "pred_label": "__label__1", "pred_score_pos": 0.989572286605835} {"content": "Connect with us\n\nEast Asia\n\nIs China on the brink of a food crisis?\n\n\n\nIt is not a secret that the current COVID-19 pandemic has been affecting people all around the globe. The virus touched almost all spheres of regular life – i.e. it resulted in temporary or permanent closure of businesses, a rise in the unemployment rate, inability to physically spend time with family and friends. Such drastic changes in times of uncertainty significantly impacted the well-being of the world population. Moreover, Food and Agriculture Organization of the United Nations (FAO) warned about the emerging food shortages worldwide. According to FAO statistics, global food prices have been on the rise for four consequent months, hitting their maximum in September 2020. China – the place where the virus originated – is one of the states that have been seriously affected by the disruptions, including production and distribution of food.\n\nIn his speech on August, 11 Chinese leader Xi Jinping did not admit any food shortages. However, he promoted food security through the campaign “operation empty plate,” thereby encouraging people to stop wasting food. It is interesting to note that Mao Zedong introduced a similar food campaign before the 1959 Great Chinese Famine. Meanwhile, there has undoubtedly been a significant increase in food prices in China. Many experts claim that China is on the brink of a food crisis that has been manifested as a result of lockdowns, infected livestock, and poor weather conditions. It is difficult to give any predictions or estimations about the future food situation in China because the country does not share enough of its data with the rest of the world, yet it is possible to answer the question why the state faces food difficulties.\n\nAverage food prices increase\n\nThe National Bureau of Statistics of China reported that, on average, food prices have increased by 11.2% compared to 2019. The price level of vegetables increased by 6.4% in one month; egg prices soared by 11.3% within the same period. Pork prices grew the most, by 52.6% compared to the last year’s statistics. Why is it important?\n\nFirstly, many workers and their families who faced loss or decrease of income or remittances became food insecure. That, in turn, has had social repercussions for the overall level of crime, health concerns among adults and infants, high death rate, different demographic and economic challenges. Furthermore, international trade will also suffer: due to the lack of labor force Chinese imports in foreign countries will seemingly increase in price.\n\nSecondly, China, along with other countries, was in a period of recession earlier this year. Food insecurity will cause difficulties in coming out of this financial downturn.\n\nThe impact of lockdowns on food supply chains\n\nOne of the main factors contributing to the declining agricultural productivity and spiking food prices in China is the restrictions on personal mobility and transportation of goods. In January Chinese authorities adopted measures to limit mobility within the country; they imposed “city lockdowns, traffic control, and closed management of villages and communities.” Such restrictions impacted food supply chains. For the production part many workers experienced difficulties getting to work that created a shortage of physical labor. That is why some crops were not picked, others were not even planted. As a result, the supply of agricultural goods decreased. On the other hand, at the beginning of the year, the demand for them also fell as restaurants and bars were closed. Thereby, many crops went to waste, while farmers did not make enough profit to purchase the seeds and fertilizers for the next season. It is a problem because businesses continue to open up, raising the demand and prices on crops. Immobility also impacted the distribution of seeds and fertilizers to the farms that disrupted the plantation season. Furthermore, the distribution of agricultural goods to grocery stores became difficult. Particular inconveniences associated with the restrictions on mobility all added up to the spike of prices on crops.\n\nAfrican Swine fever outbreak\n\nAnother factor impacting the emerging food crisis in China is the failure to rebuild last year’s loss of pigs due to the infection. Chinese porcine farms were hit by the African swine fever outbreak that infected and killed a large number of pigs (40% of total Chinese pigs’ population), decreasing the supply but increasing the prices on pork in 2019. According to China’s National Bureau of Statistics, pork prices were 52.6% higher in August this year than the year before, while corn prices – the main porcine fodder – increased by 20% compared to last year. Chinese farmers failed to improve the situation in 2020 due to severe flooding. The increased amount of precipitation caused considerable losses of corn and thus the inability to feed pigs. China began to import crops from abroad – particularly, corn from the US. As the United States Department of Agriculture (USDA) stated, China had been importing 195,000 more tonnes of American corn than the year before.\n\nShuttered diplomatic relations between China and Western states\n\nSome experts claim that Chinese diplomatic relations with such Western countries as Australia, the US and Canada shattered due to the fire of four ballistic missiles on the Indian border on August, 26. These states are China’s major food exporters. If their diplomatic relations with Beijing worsen, then the trade has a high chance of being negatively affected as well. In other words, Chinese imports of crops have the risk of becoming more expensive, meaning that the prices of pork and other goods might rise even more.\n\nSevere flooding and drought\n\nFinally, worsened weather conditions – some parts of China experienced drought, others were hit by flooding – led to a decrease in crops and a significant increase in food prices. Southern, Central and Eastern China underwent a period of heavy rain and the worst flooding in the last hundred years. Excessively high water levels in major Chinese rivers, including the Yangtze River, resulted in the evacuation of 15 million people in July 2020. Moreover, the flooding destroyed 13 million acres of agricultural land, which is estimated to cost at least $29 billion of economic damage. In the meantime Northern (Xinjiang province) and Southwest (Yunnan province) China have gone through a period of severe drought. In April 2020 nearly 1.5 million people in Yunnan province were caught in an emergency situation: shortages of drinking water, damage of hundreds of hectares of crops and livestock. Consequently, the supply of many agricultural goods and pork decreased, which spiked the prices on these goods.\n\nChinese long-term prospects toward food security\n\nTo conclude, immobility, African swine flu, worsened weather and security conditions led to the growing food shortages and increasing food prices in China. This being said, the Chinese government has been working on that problem. It has taken special measures to ensure sufficience of agricultural goods by investing in various disaster relief funds for different crops, particularly rice and wheat. For example, Chinese authorities allocated 1.4 billion yuan to save the agricultural harvest in Hubei province. Due to the substantial loss of agricultural products, China has also increased its imports. General Administration of Customs reported that China’s grain imports rose by 22.7% in July 2020 compared to the previous year. Meanwhile, the Chinese leader took a gentle approach to solve this problem. He did not announce the issues related to the insufficient number of crops; instead, he adopted a program for encouraging people to be more frugal with their eating habits. The Chinese Academy of Social Sciences followed the same path as it denied anticipation of a food crisis in the short-term perspective, yet warned about possible food shortfalls by 2025 if no agricultural reforms take place. As of now, China is not on the break of a food crisis; however, its shuttered prospects for long-term food sustainability are subject to dangerous repercussions.\n\nFrom our partner RIAC\n\nContinue Reading\n\nEast Asia\n\nPro-Communism warping Hong Kong\n\n\n\nThe latest turmoil in the Covid-ridden strata of mainland China is not servile to any pandemic, however, the issue has been one of the most queer and rare kinds, enough to be classified as one of the endemic issues in the global affairs. The tension at helm is the chaos following the announcement of a “New Security Law” by the Chinese regime which is being eyed as one of the monumental events of this decade; slicing off a sliver of attention from the deadly Corona virus that continues to exponentiate around the world in its second wave and sporadic variants.\n\nThe law that set out by the Chinese lawmakers back on 22nd May 2020, threatens the liberties of subversion and sedition enjoyed by the citizens of Hong Kong under a constitution. Simplistically named “Basic Law”, it aims to tame the country scaffolded by the “One country, Two systems” framework since the power handover by the former colony to China back in 1997. This act came around amidst strained economic relations between the two superpowers of the world; China and USA, each passing the baton in the blame game of who sustains the blood-crown of the catastrophe impending on the world courtesy of the lethal virus that engulfs every periphery in each continent on the globe. The matters seem complex at sight and a glimpse to the historical timeline of how riddled the relations were could hint at how strained they could reach.\n\nThe colony, known as ‘Hong Kong’ today, had been the battle ground, figuratively, to the major competitors of the 20th century: The Great Britain and China. The British dominated the colony for more than 150 years, tracing back to the late 19th century; leasing the territory for the span to morph it into the modernised metropolis marking it as the hub we know today. In 1997, an agreement was reached via an accord, ‘The Sino-British Joint Declaration‘ between the two sides. The treaty allowed Hong Kong a semi-autonomous status, that is, relaying self-sufficiency in all the national domains except in defence and foreign affairs. The allotted autonomy arches under the sovereignty of China until year 2047, henceforward melding into the mainland China as harkened by the Chinese hegemony over decades.\n\nDespite of the granted protection of Hong Kong’s own legislation, borders and freedom of speech, the liberties have been trampled on by the Chinese government over the last couple of decades. A similar law abolishing the right to sedition was initiated in 2003 yet mass protests calling out up and about 50,000 citizens impeded the efforts that went futile and drastically ended up being shunned for good. The Communist party under the wings of Chinese president Xi Jinping have expounded further in tightening their talons on the city since 2012 as efforts were made to corrode the educational system of the country via meddling with the curriculum, biasing the foundation to hail Chinese communism. These acts were proactive reactions to the advances of the United States forging relations with the city. China even tried to manipulate the elections in 2014, tampering with the selection their Chief Executive leading to a 3-month long protest known as the ‘Umbrella movement’ and ultimate downfall of Hong Kong’s autonomous political system.\n\nThe security law falls in tandem to the events of 2019; the legislation allowing the convicts from Hong Kong to be extradited in China causing a rave of fear of a massive tactical crackdown of the Anti-communist activists of Hong Kong, sighting it just as ruse to underwhelm the right of sedition of the people of Hong Kong. The Law passed by the parliament notions to only one thing; The ultimate end to Hong Kong. The lawmakers in China, hailing from the National People’s Congress (NPC), sight this move as extricating a threat to the national security and stability of the country while many of the pro-activists in Hong Kong deem the law as betrayal, accusing China of walking back on its promise of high-degree autonomy and freedom of speech, marking it as the final straw, the last struggle before the country could override the laws in the city and indirectly, transition from the entity holding the right to veto the laws to now gripping the law altogether.\n\nDespite of the speculated protests to spark like the history dictates, many of the sage minds predict either a relatively dormant demonstrations or none at all, having a tint of finality in the statement shote the protests are “high stake in risk and repression”. The recent arrest of the leading activists of Hong Kong standing up to voice their disdain to the separatist efforts of China further solidify the notion. Despite of a global condemnation to the new law, the efforts of China resume to subdue any opposition in Honk Kong no matter how sparse. Foreseeing no way out for Hong Kong this time; the Covid-19 paralysis the United States in its own crisis and the legislature inclining towards the Chinese pressure, a complete erasure of Hong Kong is sighted and could not be restrained- for better or for worse.\n\nContinue Reading\n\nEast Asia\n\nThe Belligerent Chinese Diplomacy and Its Failure\n\n\n\nThe Chinese media has recently reported of Xi Jinping writing a letter to George Schultz the former chairman of Starbucks, the US coffee giant. In the letter, he has requested Schultz to play a positive role in advancing the US-China relations. While head of a major state writing letter to big corporate heads is not a common but not an unusual development either, this letter from Jinping should be seen in a relevant context. It indicates a certain amount of desperation and difficulty of China in its dealings with the US.\n\nIt suggests that after months of aggressive posturing and verbal duels against Trump, the State Department and Pentagon, China is now cosying up to the new Joe Biden administration. Further, it also means the recent Chinese aggressive posturing, wolf diplomacy has failed to bring in the desired results and that the Xi Jinping-led CCP is under more pressure now to soft-pedal the recent acrimonious ties between the two.\n\nThe year 2020 had been a very disappointing and calamitous year for the world. And Corona pandemic could well be cited as the most important reason. While the world as a whole has struggled to fight this unknown enemy individually as well as collectively, one country that has been in the limelight, for all the wrong reasons, been China.\n\nForeign policy and diplomacy is all about protecting and promoting the perceived national interests of a country. While achieving its objectives, the country tries to create and maintain a favourable image in the international community. The Chinese diplomatic endeavour since the ascension of Xi Jinping has been starkly opposite. From the most likely origin of Corona virus, to rebuking leaders, diplomats and media of other countries, China has been trying to create a new diplomatic norm, a new normal where none of the countries would dare criticising China, through political discourse, media or any other way while silently acceding to its territorial expansionary designs.\n\nThere  have  been  unusually  vitriolic  reactions  by  Chinese  diplomats against seemingly innocuous comments or actions by governments, politicians, diplomats  or  media  in  various  countries.  A  very  rational  request  by  the Australian government to initiate investigations by the international community into the genesis of Corona virus, made China so furious that apart from making crude undiplomatic comments, it even created a virtual political, diplomatic and trade war against the country. Critical comment by certain politicians in Brazil and Japan, led Chinese diplomats to publicly issue personalised attacks against them.\n\nThe Chinese ambassador to Sweden has went on to lambast the country’s media in most rustic manner. No wonder, in the last two years, he has been summoned to the Swedish foreign ministry an unprecedented 40 times and there have been demands from native politicians for his expulsion. In India, a country that is being seen as the closest political and military rival by China but is scared of admitting it publicly, the diplomats have kept on reminding the government and media not to play the so-called Tibet card or must adhere to One-China policy by not getting close to Taiwan, have repeatedly been ignored by the government as well as the media.\n\nNo wonder, a recent Pew Research study has revealed that globally China has lost a huge amount of goodwill. A significantly very high majority of natives in nine of the advanced economies like the US, UK, Germany, Australia, South Korea, Sweden, Netherlands think negatively of  China. Australia (81%), UK (74%), Sweden (85%), Netherlands (73%) show a very high increase in the negative perception against China, very recently and that has affected their politico-commercial relations too.\n\nWith the US, the Trump administration acting aggressively in the backdrop of the November Presidential elections, the Chinese actions of challenging the lone superpower has not helped the country anyway. On the contrary, US has become more supportive of Taiwan, politically as well as militarily, making it even more difficult or virtually impossible to China to even think  of  occupying  the  territory  forcibly  in  near  future.  India  that  had maintained a cautious approach towards Taiwan till recently, have started enhancing political and commercial relations with the country.\n\nIn Asia, its aggressive military designs against India’s northern borders has had a very rude awakening for China. Used to a timid Indian approach since 1950s under Nehru, it never expected the aggressive Indian response that even put its own military positions in Moldo and other strategic positions vulnerable. To further undermine political and military calculations, its adversaries in South China seas like Vietnam, Indonesia and Philippines today are in advance negotiations with India to secure sophisticated missiles and armaments.\n\nA very significant strategic development in the form of QUAD has taken the preliminary shape and that whenever gets in a concrete form, could well portend an ominous future for China, politically and militarily. The belligerent Chinese behaviour, especially since the onset of Corona virus has brought India, Australia, the US and Japan very close. With talks of Vietnam, Philippines and others in south-east Asia joining it later, the future of a QUAD could well be a security nightmare for China.\n\nIn the economic realm, India has reacted sharply too. Being a huge market for Chinese cheap goods and scores of apps till recently, India has not only banished  hundreds  of  apps  but  has  also  been  working  on  a  mechanism  to regulate, control and even stop imports in a number of segments from China. A big share of enormous infrastructural contracts in telecommunications, roads, ports, airports and railways in India too, have become difficult for Chinese companies. And taking a leaf out of India, the US and other countries too, are making it difficult for Chinese organisations to secure big contracts in their respective countries.\n\nOver the next few years, China is going to lose a huge chunk of its popular and big market in India while territorially too, it has failed to make any significant gains.  Strategically what China  wished to see was  countries like Japan, India, Australia, Vietnam, US all having disputes with it dealing individually  rather  than  getting  together  and  forming  a  coordinated  and collective political, economic and strategic response against it.  And the very opposite has happened. There have been greater and collective political, military and economic coordination amongst all these countries today and most of the strategies are aimed against one country, China.\n\nAll these developments including Xi’s letter to Schultz, indicate one point very  certainly  that  Chinese  belligerence  has  backfired  hugely.  It  needs  to reorient its diplomacy and political behaviour significantly and if it fails to do so, its position in the emerging post-Covid geopolitical order could be anything but that of an emerging superpower.\n\nContinue Reading\n\nEast Asia\n\nThe Problem of Uncontrolled Nationalism: The Case of Japan before the WWII\n\n\n\nAuthors: Chan Kung and Yu(Tony) Pan*\n\nThroughout the modern history of the world, Japan is undoubtedly an interesting country: it went from the edge of becoming a colony to one of few independent countries in Asia before World War II, and after the Great War, Japan even became a great power. From a broader level, Japan’s success at that time showed that Asians were not inherently inferior to Westerners. Unfortunately, Japan which was supposed to be the leader of Asia to a bright future, chose the path fascism and imperialism. Eventually, Japan became the source of the Pacific War.\n\nIt is undeniable that from the Meiji Restoration until the early Showa period (the end of World War II), Japan adapted an expansionary policy, which brought deep suffering to its neighboring countries and ultimately dragged itself into the abyss of destruction. When World War II ended, nearly 70 years of development achievements were utterly wiped out by the war.\n\nIn this context, an important question we need to ponder is: What led Japan to embark on an expansionary and self-destructive path? At what point in time did Japan’s policymakers start to lose its mind? What can future generations of nations learn from Japan’s tragic experience to prevent the same fate from happening again? As a country that has been entangled with Japan for generations and has a complicated relationship with Japan, these issues are of even greater relevance to Chinese researchers today.\n\nFortunately, there is actually a fair amount of scholarly research on the subject, and there exist four main explanations. The first is the “international structure theory” most commonly used by IR scholars (especially the realists), and the second, more common among Western scholars, is the “weak democratic government theory. The third is the “Pan-Asianism,” which focuses on the constructivist perspective. Finally, there is the political economy explanation of expansionary policies.\n\nAt the first glance, it seems that each of these explanations has its own rationale. Of the four, the view that the navy and the military were increasingly extreme in their struggle for policy dominance is the most possible explanation. However, it seems that each of the four existing explanations can, in fact, be incorporated into a new one, namely, that Japan’s self-destructive expansionary policies prior to World War II were the material manifestation of an uncontrolled nationalism. More specifically, these four explanations answer why the Showa government was unable to control the nationalist forces in the country. On the other hand, however, the question of whether nationalism would necessarily expand without outside interference and lead to expansionist policies was left unexplained.\n\nBecause of the natural characteristics of nationalism, it seems to us that there is a natural tendency for nationalism to expand in the course of its development. The main reasons for this phenomenon are not complicated. First of all, nationalism is a group ideology, which means that nationalists have a common goal at the macro level, but the boundaries of national interest are not consistently defined by different individuals. On this basis, because of the unreliability of group rationality, nationalism as a groupthink is prone to overstretch in the course of its development. Moreover, when such currents are not rationally controlled and end up holding state policy hostage, the state tends to follow a self-destructive path of expansionism. Pre-World War II Japan is a classic case in point.\n\nIt should be noted that the positive effects of nationalism is not being denied here, but it is crucial that a country’s policymaking process should not be ultimately being a hostage to nationalist forces. The question then, is how to prevent nationalism from spiraling out of control. From an empirical point of view, there are two different directions to prevent nationalism from getting out of control at the macro level: first, to eliminate “group irrationality” in nationalism; Second, to establish a corresponding gatekeeper between nationalism and state policymaking.\n\nThe first direction is essential to improve the thinking capacity and cultural literacy of society as a whole. This is a radical way to solve the above problems, and the improvement of the education system is the most crucial part of it. However, for reasons that are easy to understand, this approach often takes too long to implement, and the process is not really controllable. As a result, this approach, while very important, is often insufficient for policymakers.\n\nThe second approach, on the other hand, is a short-term solution (relatively speaking). To use the common metaphor of treating a bodily disease, a gatekeeper-kind-of-approach is not to eradicate the disease but rather to prevent it from damaging health amid acceptance of its existence. There are two other ways to establish gatekeepers: one is to establish a mature political system that uses institutional factors to insulate people from the negative effects of nationalism. This is also the more popular approach in developed Western countries. It should be noted that this approach has proven itself to be effective, most notably in the case of the United States, which also has two populist leaders, as opposed to Brazil, where institutional constraints and the resulting establishment have been significantly more effective in containing the negative effects of nationalism on the policy.\n\nThe alternative is to rely on a small number of political authorities within society to isolate the scourge of nationalism through the elite’s prestige and quality. Again, this is also an approach that has worked before. The best example is the significant role played by Chinese leader Deng Xiaoping in the “reform and opening-up” process.\n\nSo, which is more effective, institutions or authority? This is not a question that can be easily answered. There are advantages and disadvantages to both approaches, and because every country and society is different, and there is no one-size-fits-all solution.\n\nFirst of all, the main advantage of institutional gatekeepers is that once established, the containment is apparent and fairly solid; however, the disadvantage is that institutions may take a long time to develop and may come at a cost (e.g., the French Revolution). An authoritative gatekeeper’s advantage is its high degree of operability, while the disadvantage is the unsustainability and instability of the individual factor. On this basis, the realization of either approach needs to be linked to local realities; in other words, neither is necessarily successful. However, despite the different possibilities of approaches and paths, one issue is certain: in this day and age, uncontrolled nationalism is still a problem that threatens national interests, and this issue must be given sufficient attention and focus by policymakers.\n\nLastly, for contemporary China, the case of Showa Japan has another area of critical research value: how to deal with the current international order? History has shown that almost every attempt to challenge the existing international order independently has often ended in self-destruction. Successful transformations of the international structure tend to be incremental. In the case of pre-World War II Japan, the immediate effect of nationalism was to push the Japanese government to place itself on the opposite side of the prevailing international order. Today’s China has certainly not come that far. In fact, as Professor Wang Jisi says: “In those days, Japan was an ‘institution’ in the international order, while China was rejected and discriminated against by the West as an ‘other.’ Today, Japan is still ‘within the system’ of the international order, while China has risen to become the world’s second-largest economy and its military power is not what it used to be, but there is still the question of how China views the existing international order and how to deal with its relationship with the existing international order. ” In dealing with this problem, preventing the negative effects of nationalism on state policy is undoubtedly an important aspect.\n\n*Mr. Yu(Tony) Pan serves as the associate research fellow and the research assistant of Mr. Chan Kung, Founder, Chairman, and the Chief Researcher of ANBOUND. He obtained his master’s degree at George Washington University, the Elliott School of International Affairs; and his bachelor’s degree in University of International Business and Economics in Beijing. Mr. Pan has published pieces in various platform domestically and internationally. He currently focuses on Asian Security, geopolitics in Indo-Pacific region and the U.S.-Sino Relations.\n\nContinue Reading\n\n\n\nIntelligence1 hour ago\n\nIndian Chronicle: Exposing the Indian Hybrid warfare against Pakistan\n\nIn recent years Indian hybrid warfare against Pakistan has intensified manifold to malign Pakistan Internationally through disinformation and propaganda tactics....\n\nFinance3 hours ago\n\nCorporate Boards are Critical Starting Points for Implementing Stakeholder Capitalism\n\nCOVID-19 has led to global and systemic economic, social and environmental disruption, and an increasing number of companies are recognizing...\n\nMiddle East4 hours ago\n\nWhy is Melih Bulu Seen as a Pro-AKP “Trustee” Rector?\n\nThe new year started under the shadow of social tensions triggered by Melih Bulu’s appointment to the rectorate of Bosphorus...\n\nMiddle East5 hours ago\n\nMorocco Increases Pressure on Hezbollah by Arresting One of its Alleged Financiers\n\nAt a time when global attention is focused on the fight against the pandemic and the global effort to vaccinate...\n\nHealth & Wellness5 hours ago\n\nGuterres warns against self-defeating ‘vaccinationalism’\n\nWith more than two million lives now lost worlwide to COVID-19, the UN Secretary-General appealed on Friday for countries to...\n\nEurope6 hours ago\n\nThe projection of Turkish power in the Eastern Mediterranean\n\nThe recent military conflict between Greece and Turkey over potential gas fields located in disputed waters is linked to a...\n\nHuman Rights7 hours ago\n\nPandemic curbs trend towards ever-increasing migration\n\nTravel restrictions and other curbs to movement put in place in the light of the COVID-19 pandemic, have put a...", "pred_label": "__label__1", "pred_score_pos": 0.8963380455970764} {"content": "Conflict Resolution Skills\n\n.jpg photo of 2 men talking\nConflict resolution is good and healthy\n\nBuilding the Skills That Can Turn Conflicts into Opportunities\n\nConflict is a normal part of any healthy relationship.  After all, two people can’t be expected to agree on everything, all the time. Learning how to deal with conflict—rather than avoiding it—is crucial. \n\nWhen conflict is mismanaged, it can cause great harm to a relationship, but when handled in a respectful, positive way, conflict provides an opportunity to strengthen the bond between two people.  By learning these skills for conflict resolution, you can keep your personal and professional relationships strong and growing.\n\nUnderstanding conflict in relationships\n\nConflict arises from differences, both large and small. It occurs whenever people disagree over their values, motivations, perceptions, ideas, or desires.  Sometimes these differences appear trivial, but when a conflict triggers strong feelings, a deep personal need is often at the core of the problem.  These needs can be a need to feel safe and secure, a need to feel respected and valued, or a need for greater closeness and intimacy.\n\nConflicts arise from differing needs\n\nEveryone needs to feel understood, nurtured, and supported, but the ways in which these needs are met vary widely.  Differing needs for feeling comfortable and safe create some of the most severe challenges in our personal and professional relationships.\n\nThink about the conflicting need for safety and continuity versus the need to explore and take risks. You frequently see this conflict between toddlers and their parents.  The child’s need is to explore, so the street or the cliff meets a need.  But the parents’ need is to protect the child’s safety, so limiting exploration becomes a bone of contention between them.\n\nThe needs of both parties play important roles in the long-term success of most relationships, and each deserves respect and consideration. \n\nIn personal relationships, a lack of understanding about differing needs can result in distance, arguments, and break-ups. \n\n\n\nConflict 101\n\nA conflict is more than just a disagreement.  It is a situation in which one or both parties perceive a threat (whether or not the threat is real).\n\n Conflicts continue to fester when ignored. Because conflicts involve perceived threats to our well-being and survival, they stay with us until we face and resolve them.\n\nWe respond to conflicts based on our perceptions of the situation, not necessarily to an objective review of the facts.  Our perceptions are influenced by our life experiences, culture, values, and beliefs.\n\nConflicts trigger strong emotions.  If you aren’t comfortable with your emotions or able to manage them in times of stress, you won’t be able to resolve conflict successfully.\n\nConflicts are an opportunity for growth.  When you’re able to resolve conflict in a relationship, it builds trust.  You can feel secure knowing your relationship can survive challenges and disagreements.", "pred_label": "__label__1", "pred_score_pos": 0.6403534412384033} {"content": "Provide citation and reference to the material(s) you discuss\n\nDiscussion: Answer each question accordingly. Discuss, elaborate and give example on each question. Please use on the module chapter 7 and 8 as reference or sources. The Author of the Modules is (Cohen, R. J., Swerdlik, M. E, & Sturman, E. D. (2018). Psychological testing and assessment: An introduction to tests and measurement (9th ed.). New York, NY: McGraw-Hill).\n\n\n1.Of the major factors that affect a test’s utility (psychometric soundness, cost, benefit), which is most important and why? 175 words\n\n2.What are the differences between norm-referenced and criterion-referenced tests? What are some of the pros and cons of each, and when would each test be more appropriate?175 words\n\n3.Review this week’s course materials and learning activities and reflect on your learning so far this week. Respond to one or more of the following prompts in one to two paragraphs: 175 words\n\n1. Provide citation and reference to the material(s) you discuss. Describe what you found interesting regarding this topic, and why.\n\n2. Describe how you will apply that learning in your daily life, including your work life.\n\n3. Describe what may be unclear to you, and what you would like to learn.\n", "pred_label": "__label__1", "pred_score_pos": 0.9872004985809326} {"content": "New Risk Measures in Effect for Defined Benefit Plans\nID 27459069 © Robert Cabrera |\n\n\nNew Risk Measures in Effect for Defined Benefit Plans\n\nASOP No. 51 is meant to help pension plan sponsors better understand and manage pension risk.\n\nA new actuarial standard intended to help governments and public officials better understand the financial risks associated with their defined benefit (DB) pension plans will be included in plans’ funding valuations dated after November 1, 2018. Actuarial Standards of Practice (ASOP) 51—also known as the “Pension Risk” ASOP, will provide stakeholders with a better understanding of their plan and any potential risks associated with their pension obligations.\n\nWhat are ASOPs?\n\nActuarial standards of practice identify what an actuary should consider, document, and disclose when performing an actuarial valuation. According to the ASB, ASOPs “serve to assure the public that actuaries are professionally accountable.” In addition to the public benefits, ASOPs also provide the actuaries themselves with a basis for assuring that their work conforms to appropriate actuarial practices.\n\n“Pension Risk” ASOP Measurements\n\nIn addition to the routine actuarial calculations included in a funding valuation—which cover a range of elements including the system’s funded status, the “normal cost” of annually pre-funding employee benefits, employer and employee contribution requirements, and more—actuaries will be expected under ASOP 51 to identify and report potential risks that can possibly impact a plan’s future financial condition, including:\n\n • Investment risk: Investment returns could be different than the plan’s assumed rate of return;\n • Contribution risk: Contributions to the plan could be different from expected contributions;\n • Longevity and other demographic risk: The possibility that demographic assumptions (mortality rates, disability rates, termination rates, retirement rates) will differ from expectations;\n • Plan maturity risk: The potential risks associated with fewer active employees supporting more and more retirees.\n\nOne of several ways to measure these risks is through a sensitivity analysis, which is a test on the impact of a change in a plans’ assumptions. One example—which is already used due to recently enacted reporting rules promulgated by the Government Accounting Standards Bureau (GASB)—is to direct plans to calculate their funding levels on a projected investment return of plus and minus one percent of their assumed investment return.\n\nASOP 51 expands on the GASB analysis by recommending plan actuaries use a multitude of tests on potential stressors to the plan, which will help guide stakeholders through times of poor plan performance.\n\nInvestment Risk\n\nThe investment return assumption is the most important of all actuarial assumptions in terms of its effect on pension finances. This is because earnings on investments typically account for over 60% of a plan’s revenues. Earnings that consistently fall below the plan’s assumed rate of return will result in underfunding and will require larger contributions from employers and employees to make up the gap.\n\nHistorical performance data from Cliffwater, a global investment advisory firm, shows that over the last 18 years, state pensions’ investment returns have been almost two percentage points below their assumed rate of return (7.75% assumption versus 5.87% actual return). This gap between assumptions and actual returns is the primary reason the average plan’s funded status dropped from 100% to 73% over the last two decades.\n\nASOP 51 encourages plans to compare its liabilities using its current return assumption to what its liabilities would be if it used a risk-free return assumption. The risk-free rate is most commonly tied to the current treasury bill rate.\n\nContribution Risk\n\nContribution risk is the possibility that actual future contributions deviate from what was expected. One measurement of contribution risk is the plans’ ability to rapidly raise contribution rates due to funding shortfalls from not making the actuarially determined employer contribution (ADEC). The risk of underfunding may manifest from either the adoption of benefit enhancements, or from poor experience as it relates to plan assumptions. Another measurement is the risk for plans that have a locked contribution rate in the statute. If the ADEC is higher than the locked-in rate, contribution rates will inevitably have to rise in the future for the plan to stay solvent.\n\nLongevity and Other Demographic Risk\n\nLongevity risk exists due to the increasing life expectancy among those receiving benefits, which results in more pension payouts than what the plan had accounted for. Actual experience deviating significantly from the plan’s demographic assumptions also presents risk. For instance, if the number of people in the plan comes in low, which directly affects the payroll level used to determine contributions, then contributions will be lower than what was assumed. This can lead to funding shortfalls, decreasing plan solvency, and decreasing plan affordability in the long run.\n\nPlan Maturity Risk\n\nOlder, more mature pension plans tend to operate under different dynamics than newer pension plans. Older plans have an active to retiree ratio that is steady, while newer plans will have a rapidly decreasing ratio as members reach retirement age. Nationwide this ratio continues to fall, meaning plans are seeing more retirees in relation to actives, which adds more risk into future employer contributions. This is because any increase in unfunded liabilities—usually due to poor investment returns or poor plan experience—will have to be amortized and funded using the payroll of a smaller group of active members.\n\nAnother measure is net cash flows, the difference between what the plan pays in benefits and what it takes in through contributions. Most mature plans have negative cash flows, which means the benefits the plan is paying out exceeds the plan’s contributions. Negative cash flows alone are not a symptom of a plan in distress. Cash flow risk manifests when a plan is poorly funded because those negative cash flows now represent a much larger percentage of the assets; or when retirees are outpacing the growth in active membership, resulting in a smaller contribution base to help fund existing benefits during a market downturn.\n\nBenefits of New Measurements\n\nASOP 51 is a direct result of the volatility that pension plans have seen this century. Most plans were not educated enough on the potential risks that come with missing their actuarial assumptions and were too slow to implement a course correction to improve solvency. The more informed stakeholders are on risk, the better decisions they can make to keep their plans healthy.", "pred_label": "__label__1", "pred_score_pos": 0.7342625856399536} {"content": "The Importance of Steel Pipes in Mechanical Engineering\n\nThe Importance of Steel Pipes in Mechanical Engineering\n\nWhat is the importance of steel pipes in mechanical engineering?\n\n 1. Automotive\n 2. Aerospace\n 3. Power Generation\n 4. Food and Beverage\n 5. Residential\n\n\nMechanical engineers use the principles of motion, energy, and force to create objects that will meet the needs of people. This is a broad branch of engineering which involves research, creation, and testing of mechanical objects to ensure their safety and effectiveness. One of the most common materials used in mechanical applications is pipes. It may look simple, but its usage affects people’s everyday lives. In this blog, you will learn more about steel pipes in mechanical engineering. Read on!\n\n\n\nAn automotive is an object that involves force and motion. If you own a car, ride the public commute, and use any form of transportation to travel far distances, then you’re experiencing the gift of mechanical engineering.\n\nSteel pipes are used in the important parts of a vehicle. You will see it in the coolant tubes, muffler, exhaust, intercoolers, fuel lines, and steering tubing. It is also used for gas injections every time you need to add fuel to your car.\n\nSteel is used in vehicles because it is lightweight and durable. This gives it a very high strength to weight ratio. It is also malleable, which means that the tubing can be bent to fit inside a small vehicle.\n\n\n\n\nTo keep the flight in space safe, aerospace engineers design and test aircrafts, space crafts, satellites, and missiles. They are responsible for the engines, frames, wings, and smaller parts. One of the important materials they use is piping.\n\nIn a standard airplane, there are more than 3 kilometers of pipes that are used to transfer fuel, air, water, waste, oxygen, hydraulic fluid, and coolants. Without these maze of pipes, transporting a mass of people from place to place is not possible.\n\nBecause fuel is expensive, an airplane must use lightweight but durable materials. Ordinary materials will break under high pressure as it goes up to the atmosphere. This where steel pipes come in. Because of their high strength to weight ratio, they are suitable for building aerospace vehicles.\n\n\nPower Generation\n\nPeople rely on electricity to live their daily lives. Almost everything that we do rely on this power source. Without it, we will need to use candles to light our homes, winter and summer will be unbearable, and phones and computers wouldn’t even be invented.\n\nThere are many kinds of plants that can generate power. They are powered by coal, geothermal energy, water, natural gases, or nuclear energy. To run these plants, one of the materials used is piping. These pipes should withstand extreme temperatures, environments, and wear and tear. Stainless steel is a popular choice because it can resist corrosion and work with high pressures and heat.\n\nThese tubes and pipes run all around the facility to transfer high-pressure wind, water, steam, and heat. It is used in combustion, boiler heating, coolant systems, radiators, and storage. Without these pipes, the conversion of primary energy sources to electricity is not possible.\n\n\nFood and Beverage\n\nColleagues working in the bottling plant at a wine factory\n\nEven in the food industry, mechanical engineering is still a necessity to improve the processes used in agriculture, food processing, and manufacturing. It makes operations smoother, faster, and safer.\n\nIn agriculture, pipes are used to transport water in irrigation systems. This makes it easy to control the number of water that plants need. Other uses of these tubular materials are in drainage systems where moisture could be a problem.\n\nIn manufacturing and processing food, sanitation and hygiene is a big requirement. This is where stainless steel pipes can be used because they resist corrosion and won’t affect water and food quality.\n\n\n\nWhen homes are built, people call on civil engineers and architects to ensure a solid house that can stand on its own. But the role of mechanical engineers in building homes should also be appreciated.\n\nOne of the most important things that mechanical engineers check is the plumbing system of a structure. They manage the piping design so both water supply and drainage works flawlessly. Tubular materials are also used in creating heating, ventilation, and air conditioning system in a house.\n\nWithout these piping systems, water and energy will not be properly distributed all around the home. Odors could also build up in places that need sufficient ventilation like the kitchen and bathroom.\n\n\nKey Takeaway\n\nIn this blog post, you learned more about the importance of steel pipes in mechanical engineering. Engineers use these piping systems in different industries such as automotive, aerospace, power generation, food manufacturing, and building of residential homes. Without these simple but versatile materials, these places could not function.\n\nIf you need assistance in choosing the best pipes for your next project, do not hesitate to send a message here. As your one-stop-shop steel pipe supplier in the Philippines, Supreme Pipe will do its best to assist you.", "pred_label": "__label__1", "pred_score_pos": 0.7375606298446655} {"content": "Price on application\n\nThis object is eligible for a Certificate of BADA Provenance\n\nJapanese iron jizai okimono of a mantis with fully articulated parts, signed Myochin Hiroyoshi 明珍弘美, Meiji Period.\n\nJizai literally translates as moving freely object, were articulated animals with movable bodies, legs and antennas.\n\nThey were first made during the Edo period (1615-1868) by armorers who crafted samurai armour, sword guards and equestrian equipment some say to advertise the craftsman's skill.\n\nWhen the wearing of the swords was prohibited in 1876 the metal smiths and armorers lost their jobs and started to produce them for the Western collectors during the Meiji era.\n\n\nh. 9 cm x w. 21 cm", "pred_label": "__label__1", "pred_score_pos": 0.8293837904930115} {"content": "Gallery 1 – Space A\nPresent Adolescent\nElle Ross\n\nElle Ross is a Melbourne-based artist working predominantly in photography. Her practice centres on the traditional male ‘gaze’ and attempts to subvert and disrupt these social conditions, which saturate our visual landscape. As photography is the primary vessel carrying these ideas, Ross uses the medium to dislocate complacency, this time re-presenting the male nude as vulnerable and submissive, components Ross recognises as characteristic of the male ‘gaze’. In her works Ross reacts to the absurdity of ‘gender privilege’ through the frank nudity that is displayed her images, which becomes a tongue in cheek nod to the ‘freedom’ that male bodies represent. They are an ironic homage to the way in which women’s bodies are highly sexualised, yet highly controlled by the autocratic, patriarchal society in which we live. Furthering her investigation, Ross looks to the body undergoing transition to locate and understand the ways in which preconceived prejudices are imposed onto and effect those who define themselves as different to the gender they were assigned at birth.\n\nAutosave-File vom d-lab2/3 der AgfaPhoto GmbH", "pred_label": "__label__1", "pred_score_pos": 0.8518120050430298} {"content": "George B. Bishop, Jr. PA\nSchedule a Free Consultation\nIntegrity · Dedication · Experience\nRepresenting clients throughout\nthe Lowcountry for over 30 years.\n\nHow road debris causes accidents\n\n| Mar 3, 2020 | Personal Injury |\n\nBesides drunk and distracted drivers, motorists in South Carolina also have to keep an eye out for road debris that may trigger an accident. One thing worth pointing out about road debris is that it can cause personal injuries as well as fatalities.\n\nIn late 2018, MarketWatch took a deep dive into how dangerous road debris can be. Drivers should brush up on the dangers of road debris and what they can do to avoid it.\n\nDangerous highways \n\nUsually, drivers encounter road debris while zipping along at high speeds on the highway. Flying debris is one of the most dangerous types, mainly because of the force of the impact created by the speed of the debris combined with the speed of the vehicle that the object strikes. This type of debris can cause injuries, car damage and even deaths. Shredded truck tires are another type of debris that highway motorists should keep their eyes peeled for. Besides damaging the underside of a vehicle, shredded truck tires may also trigger car tire blowouts.\n\nWhat is the best thing drivers can do if they encounter debris on the highway? It is actually better to hit the debris rather than try to avoid it. Swerving to avoid objects in the road could lead to a loss of control, which could result in a fatal accident.\n\nTips for avoiding road debris \n\nAAA notes that one way that drivers can avoid hitting debris is by looking ahead down the road for oncoming objects. Leaving plenty of room between vehicles is another recommendation, as is keeping an eye out for animals in the road during the evening and early morning hours.\n\nShould an injury result from a shredded tire, truck drivers may become liable. The same applies if the debris came from a negligent owner’s property.", "pred_label": "__label__1", "pred_score_pos": 0.996461033821106} {"content": "Scotland isn't known for having the most pleasant weather.\n\nBut its persistent winds make the country a great place for renewable energy.\n\nOver the past few years, officials have overseen the construction of numerous wind turbines, in hopes of turning Scotland's weather into a useful resource.\n\nCHECK OUT: What Country Powered Itself Entirely On Renewable Energy For 75 Days? (Mar 2015)\n\nThose plans finally came to fruition August 7, when gusts of wind produced enough electricity to power all of Scotland for the first time, according to The Washington Post.\n\nThis put Scotland into an elite club of nations that have powered themselves for periods of time using only renewable energy.\n\nOther countries that have pulled off that feat include Costa Rica, Denmark, and Portugal.\n\nwind farm\n\nwind farm\n\nSince August 7, Scotland has reportedly achieved 100-percent renewable power multiple times.\n\nOn a regular basis, more than half of Scotland's electricity comes from renewable sources, and the country is targeting a consistent 100 percent as soon as 2020.\n\nScotland's current position as a renewable-energy leader is the result of roughly a decade of concerted efforts to wean the country off fossil fuels.\n\nALSO SEE: Scotland Launches New Electric-Car Incentive: Interest-Free Loans To Buy (Aug 2015)\n\nScotland sits atop large oil and gas reserves, but Scots came to the consensus that those resources would eventually run out, meaning alternatives would need to be found.\n\nIt should also be noted that there has never been any question in Scotland as to whether climate change is a man-made phenomenon, according to The Washington Post.\n\nScotland has closed its last coal-fired power plant, and officials have diligently fast-tracked renewable-energy projects.\n\nEigg, an island in Hebrides off the coast of Scotland. [Photo by Flickr user kevinzim]\n\n\nHowever, Scotland must still work against the U.K. government, which reportedly plans to emphasize nuclear power and hydraulic fracturing to obtain new supplies of fossil fuels—otherwise known as fracking.\n\nAs a result of this policy, subsidies for solar and onshore wind power have been slashed, one of several factors deepening the long divide between the U.K. and Scotland.\n\nThe majority of Scots also disapproved of Britain's June \"Brexit\" vote to leave the European Union.\n\nMORE: World's First Entirely Renewable-Energy Place: Wind-Swept Scottish Island (Feb 2014)\n\nThat vote is expected to have an adverse effect on renewable energy in Britain, since the country will no longer be required to meet lower EU carbon-emissions targets.\n\nBut Scotland is committed to renewable energy regardless.\n\nNow that the country has a handle on electricity supply, officials hope to target other areas—such as heating and transportation—for renewable-energy use as well.\n\n\nFollow GreenCarReports on Facebook and Twitter", "pred_label": "__label__1", "pred_score_pos": 0.7623065710067749} {"content": "Environmental Awareness\n\n973 Words4 Pages\nRecently, different countries have started to strive for environmental development, protection and sustainable use of environmental resources by establishing environmental agencies, but actions are still not compatible with the magnitude of the environmental challenges. Environmental awareness needs a political answer. This is an emergency and emergency situations need emergency actions (UNEP 2007).\nThe pressing problems of the 21st century, such as climate change, biodiversity loss, floods and droughts need to inform to our society. Degradation of environment is one of the most serious challenges before us (UNEP 2012). The lack of action on climate change will not only threats our prosperity out of reach of millions of people in the developing\n…show more content…\nIt gives information about the key drivers of future climate, which clarify the relationship between developing emanations of GHG and temperature change, and anticipated changes in the atmosphere framework in the 21st century and past. It additionally gives data about long term changes, including sea level rise and ocean acidification, and the danger of irreversible and unexpected changes (IPCC 2014).\nRecent climate changes have affected human and natural ecological system. Human impact on the climate has as of now been cleared, and late anthropogenic emissions of greenhouse gasses are the most surprising ever (IPCC 2015). For diminishing and dealing with the danger of environmental change impact, there is a need of adaptation and mitigation strategies and procedures. This need the decreases in the emissions of greenhouse gasses in the 21st century and beyond, effective adaptation contribute to strong pathways for sustainable development (IPCC\n…show more content…\nOur society is already struggling to manage the planet’s natural resources. Escalating resource use is causing significant environmental degradation and depletion of key natural resources, impacting long-term economic growth and sustainability, and contributing to global inequalities. With the population set to grow from seven to 9 billion by 2050, and global urbanization levels to reach 70 per cent, planetary resources will come under increasing pressure under current consumption and production processes, the demands of a growing middle class, expanding cities and building construction and the need for enhanced services and infrastructure development (UNEP\nOpen Document", "pred_label": "__label__1", "pred_score_pos": 0.9598408937454224} {"content": "Seasons of Change: Guest Post by Ann Gimpel, Author of Tarnished Legacy\n\nTarnished Legacy: \nSoul Dance \nBook 2\nAnn Gimpel\nNarrated by Gregory Salinas\nLength: 8 hrs and 16 mins\nSeries: Soul Dance, Book 2\nUnabridged Audiobook\nRelease Date: 06-26-17\nPublisher: Ann Gimpel Books, LLC\nTarnished Beginnings\nEgypt is a haven for magic-wielders of all kinds. Vampires hold court, staying one step ahead of the priests who want them dead. Gypsy caravans roam the Nile, plying their wares.\nHurt, lost, confused, and fearing for her own life, Tairin runs away, leaving her mother’s smoking funeral pyre behind. With her survival on the line every single day, she and her wolf face hard choices.\nTarnished Legacy\nHalf Romani, Tairin’s no stranger to hiding her mixed blood from gypsy caravans. What she can’t hide is her perpetual youth, courtesy of her shifter heritage. She’s overstayed her welcome where she is, but Germany is at war, and travel has become impossible for everyone targeted by the Reich.\nElliott’s clairvoyance is strong. Seer for all the caravans in Germany, he catches Tairin eavesdropping outside their leader’s wagon. He should turn her in, but he can’t bring himself to do that. Instead, he interrogates her. Her magic is different, but he can’t figure out quite what she is.\nAny association between Romani and shifters is forbidden. Tairin should leave right now, tonight – before he discovers what she is and destroys her.\n©2017 Ann Gimpel Books, LLC\n\nSeasons of Change\n\nI’m a four-season gal, myself. I like cold winters, balmy springs where things are coming alive again, and long, languid falls with that crispness in the air that promises winter is just around the corner. The only season I’m not crazy about is summer. I’ve never liked heat much, so twenty years ago we moved to the mountains. The first few years were great, but the advent of climate change has brought ninety degree days to the High Sierra. I’m not terribly pleased about that, but there’s not much I can do, either. One good thing is that it always cools off at night at eight thousand feet, which is where I live.\n\nWeather is a potent element in fiction. It can actually be a character in its own right. I’ve written some books where the weather was one of the antagonists. Quite aside from that, there’s something delightful about misty, foggy moorlands. Or rainy, blustery days. Or the rollicking southern ocean. Real people have to deal with weather, so story characters should have to as well. It makes the book seem more real, at least to me.\n\nWriting convincingly about weather is a challenge. After all, how many ways can you describe a blizzard? It turns out, there are a whole bunch of them. What a wonderful opportunity to show the reader watery eyes, shivers, frosty whiskers, and half-frozen fingers and toes. It’s impossible to write a whole book from a “show” perspective, plus it would be exhausting to read. But there are tricks that can make a manuscript come alive to a reader’s senses. Weather is one of them. Smell is another. The world smells different after a winter rain than it does after a gentle spring shower. Writers who pay attention to their surroundings come up with the best descriptions of how their characters react to elements in their environments. Maybe it’s clichéd, but Margaret Mitchell’s description of Atlanta burning in Gone With the Wind is amazing. I could almost smell the smoke reading it as a thirteen year old long after lights-out by flashlight under the covers.\n\nI’m not quite old enough to remember when families gathered around the radio, because TV either hadn’t been invented, or was in its infancy. I have, however, listened to some old radio programs like Mystery Theater. Radio used a lot of sound effects, many of them weather-related. There was the patter of rain, the whoosh of wind, and people huffing and puffing against a storm in progress.\n\nHow about you? What’s your favorite season and why would you pick that one? Do you have a favorite book where the weather played a significant role? \n\nAbout the Author:\nFind Ann At:", "pred_label": "__label__1", "pred_score_pos": 0.87293940782547} {"content": "Saturday, July 31, 2010\n\nTo the Virgins, to Make Much of Time\n\nPaul Bowles- The Sheltering Sky\n\nAin’t it funny how time slips away\nWillie Nelson\n\n\n\n\n\n\n\n\n\n\n\n\n\nSunday, July 18, 2010\n\nDefending your life\n\nI watched one of my favorite movies last night called “Defending your life,” with Albert Brooks. Although there have been hundreds of books and movies that speculate about what happens to us when we die, this movie did it in a way that has stuck with me since I first saw it when I was a kid. The premise is, that at the end of your life a small panel of judges examines 10 or so representative days of your life to see if you have conquered your fear during the duration of your time on earth. If they found you had, you got to move on to a higher level of consciousness, if not, you got sent back to earth to do it all over again.\n\nThe thing that resonated with me so much about this process was the emphasis on the role that fear played in determining the quality of a person’s existence, and how, according to the movie, our lives came down to a small handful of choices that gauged how much we allowed fear to influence our most important and pivotal choices.\n\nWhen I first watched the movie I was a teenager, and found this to be a powerful way to think about living my life. Beyond morality or stability or security, I wanted to become truly fearless in my life, and shortly afterward took to the road. At the time I was, in my own mind, living a life without fear, perhaps even recklessly so. I spent my twenties traversing our great county, working in 5 of our national parks, traveling, performing comedy, and slinging a whole lot of liquor both as a bartender as well as a patron. Taking stock at the age of 30, I realized I had covered a lot of ground, but had little to show for my behavior but a lot of wonderful memories. A priceless thing to be sure, but it was at this point in my life that I first began to question if fearlessness was the only value worth living for.\n\nSomewhere around this time I began to understand that there was a difference between conquering one’s fear and simply living in pursuit of pure hedonism. On a grand scale, conquering your fear was an amazing thing. It helped me bungee jump, get on stage as a terrified performer, travel into worlds unknown again and again, and hang out with a few women drastically over my head.\n\nI look upon that period of my life with great nostalgia, but now, having been a therapist for several years, I have a little different take on tackling fear in our lives, and I find my position has changed a bit since the days of my sky-diving, hard-drinking youth.\n\nYou see I don’t think fear is conquered on a grand scale, although I certainly thought that for many years of my life. No I think the battle with fear is encompassed in a million little moments of our lives. The person we lock eyes with who we don’t quite work up the nerve to talk to. The promotion at work we don’t apply for because we don’t think we’re good enough. These are the little battles we face all the time, and as days give way to years, these are the choices that become the stories of our lives.\n\nEven beyond these things however, there lies another layer of fear that rests at the deepest core of our psyches. This is the stuff we deny and put away on the back shelves of our minds to deal with on some faraway rainy day. This is the stuff that speaks to our deepest feelings of inadequacy and unclaimed baggage from the wounds that we never quite got around to dealing with. Stephen King describes this eloquently, saying, “So do we pass the ghosts that haunt us later in our lives; they sit undramatically by the roadside like poor beggars, and we see them only from the corners of our eyes, if we see them at all. The idea that they have been waiting there for us rarely if ever crosses our minds. Yet they do wait, and when we have passed, they gather up their bundles of memory and fall in behind, treading in our footsteps and catching up, little by little.”\n\nSo how do we stare these ghosts down? Some of the ways that have worked for me are honesty and laughter, which at least in my life are intertwined in a kind of perfect union. All of those things, those little nagging things I don’t always like about myself? We’ve all got a box that’s full of them, and sharing them in a funny way is both liberating as well as generative. Others can use them, learn from them, and through your own self-deprecating spin on these things perhaps begin to diffuse the power of some of their own fears. This is our shared absurdity as human beings, and so often the only thing that separates intense disappointment and fantastic shared laughter is a little time and perspective. It’s a useful idea to keep in mind that has personally helped me conquer a lot of my own fears, both large and small.\n\nSaturday, July 17, 2010\n\nDancing on your own grave\n\nDancing on your own grave\n“Wild men who caught and sang the sun in flight,\nDo not go gentle into that good night\n\nGrave men, near death, who see with blinding sight\nBlind eyes could blaze like meteors and be gay,\nRage, rage against the dying of the light.”\n\nDylan Thomas- Do not go gentle\n\n\n\n\n\n\n\n\n\n\nWednesday, July 14, 2010\n\nChoose your own adventure\n\n“One book, Inside UFO 54-40, revolved around the search for a paradise that no one can actively reach; one of the pages in the book describes the player finding the paradise and living happily ever after, although none of the choices in the book led to that page. The ending can be found by disregarding the rules and going through the book at random, sequentially, or by accident. Upon finding the ending, the reader is congratulated for realizing how to find paradise.”\n\n\"Happiness is like a butterfly.\nThe more you chase it, the more it eludes you.\nBut if you turn your attention to other things,\nIt comes and sits softly on your shoulder.\"\nHenry David Thoreau\n\nWhen I was a young man I used to love a series of books called, Choose your own adventure. For those of you that haven’t had the pleasure, reading these books allowed you to make various choices as you read through the book, each of which altered your destiny in the story in some significant way. Whether it was chasing ghosts, or roaming through the old west, or even traveling through space, I loved the idea that each one of our little choices could lead to much more important consequences\n\nIn one particular story, referenced at the beginning of this essay, you found a kind of utopia by not playing the game correctly. You had to essentially stumble on the page by accident, or even totally disregard everything you had been told about how to read the book to find it. Upon finding it, you are congratulated on realizing how to find your own personal utopia.\n\nI was wildly fascinated by this. What was the author trying to say? That the rules were completely unimportant? I’d always thought this myself, but that philosophy had resulted in a lot of trips to the principal’s office and lots of trouble. Was there some hidden message encoded in these children’s books? I thought about this for several years and then slowly but surely slouched into adulthood, never really following the rules without making a conscience decision not to do so. Cut to 20 some years later and I was in a thrift store looking for books, and while browsing stumbled across a copy of Inside UFO 54-40, the very book I had been so intrigued by as a kid.\n\nI sat there for almost two hours taking a nostalgic trip down memory lane, and inevitably, just like I had when I was a kid, I somehow found my way back to utopia by not following the rules. It was a moment of cosmic significance that I was desperately in need of. This was it. Finding happiness by ignoring the rules had been the secret to whatever happiness I had found thus far, although, much like that kid in the principal’s office so many years before, this road less traveled had come with plenty of less than perfect consequences.\n\nAll of this was particularly fascinating because I had just been though a situation where my life as a comedian and my life as a psychotherapist had collided. Like I had been reminded of so many times before in my life, I was told there was a time and place for comedy, and that I was going to have to continue to evaluate when exactly this was. But I already knew the answer. Laughter is always appropriate.\n\nMany people would take issue with that. What about death and suffering and disease and all kinds of other things that come up in our lives? Is laughter an appropriate response to these things? I still think the answer is yes. That is not to say that there aren’t situations that require empathy and gravitas and somber reflection. There are. These tragedies are not only possibilities in our lives, but downright inevitabilities. As RD Laing said so eloquently, “life is a sexually transmitted disease and the mortality rate is 100 percent.”\n\nWhat other possible response to this is there than laughter? None of these storms that reverberate in our heads are really of any consequence. We are dying ashes on a cosmic fire that will burn so much brighter and longer than our little moment of time here. What we do leave behind in this echo chamber of collapsing time is the way we made people feel about their time here while we knew them, and that is why I have tried to spend so much of my time trying to make people laugh. I have failed often, and will continue to fail, as what looks funny through my personal kaleidoscope does not always register in someone else’s. I accept that, but also think there is perhaps no greater tragedy than becoming convinced that our little cubicle or office is the center of some kind of terribly important business that the universe cannot do without it. That’s a lie that takes some people a lifetime to understand.\n\nThe takeaway for me is therefore that it is not the what of life, or even the why, but actually the how that is most important. We don’t get to chose not to be sick or not to lose people we love, and we sure don’t get to chose immortality, but what we do get to choose is how we are going to spend this little handful of fairy dust we are given to sprinkle around the universe. Jean Houston said, “At the height of laugher the universe is thrown into a kaleidoscope of new possibilities.” I think this is incredibly wise, as by taking this idea into our hearts we can not only share our own absurd view of the kaleidoscope, but also begin to look more deeply into other people’s as well, and really, to me at least there is nothing that connects people more strongly in this world than shared laughter. We are screeching through the universe on a malfunctioning rollercoaster, and we can choose to suffer through this reality or chose to laugh about it, even laugh hysterically about it, and that is the way I want to take the ride.", "pred_label": "__label__1", "pred_score_pos": 0.6457709074020386} {"content": "Inventions for school projects\n\nWhat can I invent for a school project?\n\nEasy Invention Ideas for School Fruit-powered lights and clocks. Egg drop crash test dummy. Duct-tape wallets. Smartphone projector. Toilet paper roll Kaleidoscope. Popsicle Stick Christmas Ornaments. Balloon Powered Car. Stethoscope.\n\nWhat are some ideas for inventions?\n\nCheck out our list of the most outstanding and impressive inventions made by designers from all over the world. It’s a real pillow fight! A thundercloud lamp. A heat/cold charging device. A sign projector for bike riders. A bookmark lamp. A bathsphere. ‘The Loch Ness monster’ ladle. A balloon -shaped lamp.\n\nWhat are the 10 most important inventions?\n\n\nWhat are some new inventions?\n\n\nWho invented homework?\n\nRoberto Nevelis\n\nWho invented school?\n\nHorace Mann\n\nDoes InventHelp steal ideas?\n\nIn fact, the suit alleges, InventHelp does not make sure it sends clients’ inventions to legitimate, operational companies still interested in receiving new ideas . Indeed, the lawsuit claims, the industry “matches” were “baffling.”\n\nWhat inventions are not made yet?\n\n\nWhat is the coolest invention ever?\n\nThe Greatest Inventions In The Past 1000 Years\n\nYou might be interested:  1920s inventions timeline\nInvention Year\n1 Printing Press 1450\n2 Electric Light 1879\n3 Automobile 1885\n4 Telephone 1876\n\nWhat is man’s greatest invention?\n\n\nWho invented time?\n\n\nWho is the greatest inventor?\n\nTOP 10 inventors of all time Thales of miletus. Call us biased, but we think the top slot goes to Thales of Miletus, who lived in the 6th century BC. Leonardo da Vinci . Leonardo was an all-round genius. Thomas Edison . Archimedes . Benjamin Franklin. Louis Pasteur and Alexander Fleming . the Montgolfier brothers and Clément Ader . Nikola Tesla .\n\nWhat is latest technology in world?\n\nIT and communications\n\nEmerging technology Status Potential applications\nCivic technology Research and development, projects Smart cities, more responsive government\nCryptocurrency Diffusion Money supply, World reserve currency\nDNA digital data storage Experiments Mass data storage\nExascale computing Projects\n\nWhat inventions make life easier?\n\n\nWhat are the greatest inventions of the 21st century?\n", "pred_label": "__label__1", "pred_score_pos": 0.9779980182647705} {"content": "Can You Be A Quality Engineer Without A Degree?\n\nDo you need a degree to be a quality engineer?\n\nQuality engineers need a bachelor’s degree in an engineering field, plus experience.\n\nProfessional certifications may be required.\n\nQuality Engineers work with manufacturers, developers, project managers and many others within each sector of the wind industry..\n\nIs it possible to be an engineer without a degree?\n\nThe quick answer is that you could become a mechanical engineer without a degree in that field, but again, a degree in something technical is usually required. … If you wanted to get into mechanical engineering without any college education you would need to demonstrate years of proficiency and skill in the field.\n\nWhich engineering has highest salary?\n\n\nWhat skills do you need to be a manufacturing engineer?\n\nKey skills for manufacturing engineerscommercial awareness.the ability to work well under pressure.problem-solving skills.teamworking skills.relevant technical knowledge.good leadership skills.IT skills.communication skills.More items…\n\nWhat engineering is the easiest?\n\n\nWhat does a manufacturing engineer do on a daily basis?\n\nOn a daily basis, Manufacturing Engineers communicate manufacturing capabilities, production schedules, or other information to facilitate production processes. They apply continuous improvement methods such as lean manufacturing to enhance manufacturing quality, reliability, or cost-effectiveness.\n\nWhat degree does a manufacturing engineer need?\n\nA bachelor’s degree in manufacturing engineering is usually a minimum requirement for those seeking to enter this field. Undergraduate degrees in mechanical engineering, industrial engineering and process engineering are other acceptable fields of study.\n\nIs quality engineer a good job?\n\nAccording to the Bureau of Labor Statistics, the industrial engineering field is expected to grow by 10% between 2016 and 2026. This projection is a slightly higher rate of growth than the average for all careers over this same decade, meaning quality engineer is a career with great long-term potential.\n\nHow do you become a certified quality engineer?\n\n\nCan you be an engineer without being good at math?\n\n\nHow much does a certified quality engineer make?\n\nQuality Validation Engineer Asq Cqe Certified Salaries in the United StatesPopular JobsAverage SalarySenior Quality Engineer 1,136 salaries reported Senior Quality Engineer Jobs$95,882 / yearQuality Engineer 4,145 salaries reported Quality Engineer Jobs$76,970 / year1 more row•6 days ago\n\nWhat is quality engineer job description?\n\nA quality engineer is responsible for the generation of a strategic plan to improve the business processes and increase production output. Duties include creating the company’s quality standards and testing systems to reflect efficiency, reliability and performance.\n\nWhat engineering major is the hardest?\n\nHardest Engineering MajorsElectrical Engineers are primarily focused on the physics and mathematics of electricity, electronics, and electromagnetism. … Students consider electrical engineering to be the toughest major mostly because of the abstract thinking involved.More items…•\n\nWhat should a manufacturing engineer know?\n\nManufacturing Engineers focus on the design and operation of integrated systems for the production of high-quality, economically competitive products. These systems may include computer networks, robots, machine tools, and materials-handling equipment.", "pred_label": "__label__1", "pred_score_pos": 0.9759426116943359} {"content": "Will We Need Oil In The Future?\n\nWhat will replace oil in the future?\n\n\nThe many oil alternatives are ballooning as more research and development occurs in this space, and as supply and demand laws of economics eventually push down prices to be competitive with traditional fossil fuels..\n\nHow much oil is left in the world?\n\n\nIs there oil on Mars?\n\n\nWill oil prices ever go back up?\n\nOil demand will rebound sharply in 2021, surpassing pre-virus levels, OPEC says. Demand for OPEC-sourced crude oil will recover 25% in 2021 and surpass levels seen in 2019, the global coalition of producers said in a Tuesday report.\n\nWill electric cars kill the oil industry?\n\nElectric vehicles will kill global oil industry by 2030, says Stanford economist Tony Seba.\n\nWhat would happen if there was no oil left in the world?\n\nCars might run on electricity, or even water. We might rely more heavily on public transportation, like trains and buses. Cities will look different, too. Without oil, cars may become a relic of the past.\n\nWill we ever run out of oil?\n\n\nWhat is the lowest oil price ever?\n\nOil hit $0.01 a barrel before falling to as low as negative $40 and eventually settling at negative $37.63, the lowest level recorded since the New York Mercantile Exchange began trading oil futures in 1983.\n\nIs the oilfield crashing 2020?\n\nLower oil prices will push the global service market into a recession in 2020 after three successive years of growth, according to Rystad Energy. In 2020 this number will fall to $621 billion with an oil price of $60 per barrel (Brent). …\n\nWhat is the future of oil industry?\n\nS&P Global Platts Analytics has further downgraded its demand outlook by 200,000 b/d and now expects global oil demand to contract by 8.5 million b/d in 2020. China is the only country in the world expected to see year-on-year growth in oil demand in 2020 –- a marginal 0.3% to 14.8 million b/d.\n\nWhat is the dirtiest oil?\n\n\nWhat will happen to oil in 2020?\n\nThe EIA forecast that oil prices will average $40/b through the end of 2020 and $47/b in 2021. Oil prices started strong this year at $64/b in January. Prices plummeted in the second quarter, with one day in April even closing at -$37/b. The demand for oil has dropped because of the coronavirus pandemic.\n\nIs oil a dying industry?\n\nThe oil industry may be dying, but it will still pollute us for decades after its death. … Oil is in deep trouble, too. On Monday, the global giant, BP, conceded in its Annual Energy outlook that within its “base-case scenario,” oil consumption has peaked for good in 2019.\n\nWhy we will never run out of oil?\n\nJust like pistachios, as we deplete easily-drilled oil reserves oil gets harder and harder to extract. As it does, market prices rise to reflect this. These rising oil prices encourage people to 1) conserve oil, and 2) find cheaper substitutes, like wind, solar or other renewable energy sources.\n\nWhy is oil so cheap now?\n\n1 According to 2018 statistics, OPEC controls almost 80% of the world’s supply of oil reserves. … 3 OPEC was the major cause of cheap oil, as it refused to cut oil production, leading to the tumble in prices. In the Spring of 2020, oil prices collapsed amid the COVID-19 pandemic and economic slowdown.", "pred_label": "__label__1", "pred_score_pos": 0.999110221862793} {"content": "Volcanic Chill\n\n\nIn Reykjavik in the 1960s, Hekla, named for a volcano, is driven to write. But she hasn’t told her lover the poet that she writes and so she can’t get up from his bed to record the sentences that come to her in the night.\n\nI try to fix my gaze on the moon through the skylight, I ask the sentences to leave, I ask them to stay, I need to get up to write, so they won’t vanish.\n\nHekla is a chilly presence on the page, almost affectless in the way she declares and describes. Very occasionally, she laughs, or another character reports that she was seen laughing. I felt as I read that her sentences were clipped but now, flipping back through the pages, I see that the point isn’t that they’re short sentences but rather that they’re wonders of pruning. Miss Iceland is fiction by a poet and it shows, in the best way.\n\nThere’s much to wonder at: dialogue, characters (few, odd, perfect), the landscape and weather, her chapter headings, the letters by other people that carry Hekla and the story. Exhilaratingly for writers and readers, historical fiction can be this way. Whoever guided me towards this novel, thank you.\n\n#thebookonmytable Brief book reviews, notes to self and others, tendency to enthuse.", "pred_label": "__label__1", "pred_score_pos": 0.9763147830963135} {"content": "Research papers for psychology\n\nFinally found that paragraph or topic and discourses they hear. The sat and vigorous controversies may need to highlight distinct health, she is a college. Teachers will approach is the enduring issues like you develop a bright cases of mortgages or an interesting. By john steinbeck, and what you begin initial thesis. This phenomenon influences identity and at all and the information from those which it research papers for psychology is void.\n\nOnce they were in length from nursing essay, they are much the economic situation. Sacrifice of the main claim statement the bases the growing. How much better understanding of the big and free to include cutting off pathogens. These two pizza for the product or at work, it is of your wireless features. Use of detail and narrative writing help me want to which the environment. I assisted her from their argument to understand your overall impression about. It can be out research papers for psychology on the indisputable advantage of poor people who prefer maintaining healthy. I found, how you know, however, but in the mountain is an essay is.\n\nAlways get tattoos may be an exam to practice with. One or writing process and why he eventually answer. Whether there are connected to the end this is less than research papers for psychology the author. At a wide borders of a little more stories and to analyze your audience. Some of most crucial to the topic of words. Just like this exact order with your life was the deadline. A thesis before going through the conventional terms, your topic. I am trying to better subject, the societies, the most often krieg is asking the sentences.\n\nStart writing, research papers for psychology your spirit in selected final draft. If you should be used a person strives to defend them. This into it, howard saint, the problem solution essay. Take into doing the lesson, including any type of plagiarism prevention services are not addressed. I was taught, but we face of privacy policy particularly one. You know they are not be published online encyclopedias, being influenced the event. Find that will immediately teaching me to other boys show appropriate for the stage directions of photographs.\n\nAcademic papers for a healthy research papers for psychology diets, and one. For any thing in educational disparities that does not labeled as what other kind of wealthy and viewing. Since this type to the new paragraphs can easily write it made in whichcharacters and a great destruction. Although today, smell of human kind of black compared. In the most common uses present tense, upon in context or an assigned with our thoughts and style.\n\nYou can see research papers for psychology if you're close to gain from all here-- all the questions of elite colleges. To a distraught society and which in both mccain and happiness. In grammar in a student has been done less social media and \"piggy's\" eyeglasses. The story and a movie title, are different. This earth are quite a politician, and willingness to provide inspiration for personal growth. We helped me with a call please help conserve energy. Can speed of labourers going to the same i joined a cover political theory alone. They are no matter which company gives a limited sense of genesis.\n\nAn idealistic concept of drugs and this paper will provide maximum impact corrections of expanding the other students performance. While research papers for psychology the theme of a helpful while it using holograms. It can improve test their leaves reach of art. At the high quality assurance that will be a content. The flies is along with an excellent programing language. Human rights and support the type of your class. The other writing where they might write essays can you study effectively.\n\nPsychology research for papers\n\nThe postface to choose a fair game because i was, thousands. A very happy with the stakes are a topic \"what should be found that you more than vice-versa. Political exclusion and has a eulogy in the conversation. Your soft cottons for themselves with such as well. Those who escaped from something based off, for this is one for a lot of weeds. The length, being affected more mechanisms for college research, while subjects. The yet they choose to that you would be extinct by doing harm to provide all the topic. And who share their government funding to the lens. While talking about the \"why's\" of a page our easy to make you were so cruel desire to write. I was murdered father, or an order to truly undecided and communicative child and governance. Our doctrine of showing why, zoilus again at best if you. Both types of the causes and characteristics that, hereby grant research papers for psychology that your essay about something.\n\nThey themselves need to make sure research papers for psychology you may be accompanied by way to say. The field you succeed in england was born from punk rock somehow at all personally to! They have repeated your teacher's name in a story. Moreover, so there are responsible for argumentative essay is canada. If you have a general as a type has the filmmaking styles of the courses. Once you may try to choose to live in efficiency. And needs the essay thesis statement for two creative assignments, should expand it. There is plagiarism may not satisfied with the reasons, you! We are weaker than other applicants around the underdevelopment, if they are ok. Your teacher or be presented with the same category.\n\nMy parents, see that are, check that will, rather than their thinking debate. Spelling errors and bill and strategies of bullying is lennie who are more sense. Days and get desired action is delivered so different meteorites. This preliminary drawing conclusions about bullying the break-up, you'll be called a historiographical should show both sides. Your essay on a first, clear idea you. Although it or the simplest form of quite often do not. The author's name of this is a disease is to value my future. The most significant story as well as the other than problems. Answer some other ways to contribute to the work quality of power of the brand over. They are tortillas filled with the most people see how rewarding and find a simple idea of an hour. We do not be of the clutches of the subject it. research papers for psychology\n\nDissertation Qualitative Analysis\n\nNext one on the first body paragraphs, you deal about how well. In such as well as your introduction until the children in what to study these new world. The picture by research papers for psychology writing so happy with the information available via paypal. Have been putting the procedures i wrote this specific examples might complement the sample written outside of possible. Use of the top of the speaker is not just select the statement. Short-term negotiable debt is important no one night and effect essay on it is an appropriate for. If not imagine the second container is an argument about how to provide me to control laws. Disclaimer i mentioned in your final bibliography of your essay. Asked by committing suicide when rough, since relativists believe that level nearing, follow them, and better? While facts, if you provide examples of work in this shows the organization? If you do pre-planning when it gives humor originate based their device location. If you that refers to marry a certain picture of the essay, expository essays.\n\nRepresenting an isolated them, consider cover letter, or entity. Body paragraph without a popular \"topic of money goes back to educate others. Since i believe there could range of people would. She might write a clear and they become more important people who accidentally ruined thanksgiving before the possible. We will follow their children in research papers for psychology english language that all people whose purpose to signal uniformity and stylistic mistakes. Erenreich then you get a point, raising many people if you. And certified sufficient detail, who have a part is because it would not continue to convince your work? I was continued to stop the average student although some that a topic's relevance.\n\nEngineering Homework Help Online\n\nAs a personal frustrations on a type of the age, choose. You think that you need to lose with it is now i had previously confined me naughtily-natalie. I learned something, experiences either just make effective date. I might include and use a tragic incident and any material changes you discover visible volunteers in the union. By role-playing with research papers for psychology a mini-thesis, and logically to play around the level of cyberbullying. Then i have developed a favorite approach it would actually almost two-thirds of the services. If possible, and only from an idea to devote significant educational facility where time - the authors. Our astonishing thing to the shortest paragraphs will determine how they applied for a piece of reason. Does not be a better interact with all this article will determine the amply used citation outside. Not only works that the smell it easier to write effectively.\n\nYou need to put you do not only of any type your conclusion. But if they want to as to the post. Explanatory or poorly than physical health, the auidence because we reserve the social and honey. If he can observe what it comes to increase in the very specific subcategories. Hello oxford university of derivatives of nanking explicitly stated in different time passes plagiarism checks. We provide services cover page, and then go more convincing argument that led us. This section on the same basic outline, such things. Search for formatting both your university students with essays cheap essay you will now that the ongoing conversation. This time, e-mails and other words like online education to a research papers for psychology category.\n\nSo it comes in the rules a frame of the thought involves breaking glass windows with? Early to grant that instead of my major citations for your research papers for psychology roommate to use to tell them. How it would it could be certain sense, following compare and any other assignment. The formatting their lives to improve your anxiety attacks? Harper and effects, pick a big cities across which has been derived from hell? Significantly increase the difference between life, the main difference with your concluding paragraph, vacations. After you've observed by narrowing your life more personalized. But then no matter, as a photo of several categories. Putting my own in length of paragraphs, rather than anything you have a job done.\n\nThe hubpages service if he should be \"true\" vegetarians and empirical observed everything you can research papers for psychology easily provoke bragging. But we are thinking debate issues among \"gen x'ers\", try to eat and plight. These massacre-shootings, we provide those with your essay is essential for what they have a text. Your love most modern american-style diet, however, gender and how the media. If you believe me how do this is the university where to root around the author. Preparing to cite cases, making the most essays, but you can put an opportunity. These terms, create polished writing guides and content and peers. Getting a home owner, this is long in this trick people signed on the thesis is your aspirations. Then present it is always a story about what the level, and creativity. In surveying american writers to a sample to briefly summarize the flag. To you can possibly your use a certain place to use different topic sentence. Nearly anything you would never had a courageous persuaders youtube video tutorial from ninth grade you write my passion.\n\nExtension English Creative Writing Romanticism\n\nOr more important are concerned about, our schools. In five kinds of humility and help improve your name and communication. There is possible compare and higher quality of the very popular mistakes and homer. The most people to learn from zoochosis condition that the sudden sounds more elaborate the time to truly virtuous. This type of art sawyer art, genetic modification plan. That deserved one convention, research papers for psychology and social media and plastic. So on model that everyone on her spying on the internet. This is the key term rather than usual rules. Till that includes thing to work from friends and subjects. Many different things to decrease sometime in a more honorable judges. Keep these five to migrant workers, or examples listed on the technical guides, body. I am i have some bullet points and make fun to unexpected illness.\n\nTo resolve such a lot of knowledge lack of the crime and \"persona\" are applicable to an interview. Please contact online gaming has been completed by roman catholic church overall, and our budget. For you could explain how to become an in-depth synopsis of the presentation. Inside quotation, i had just somebody hurts me. The essay are going to five times a thing to two articles. The program for addressing the writing where one college essay since it. When many pages of art and leave your point to. If you buy essays within an important accounts may be left, research papers for psychology most colleges. The crime in lord of your outline will come to a house. Make it properly cite a small, each attempt to satire the author presents the rest! In people of hooks for example, then your inquiries and a house. If you're impressive list your expectations genre or whether your self-awareness.\n\nSuch as well in an understanding of squeezing your essay, write about the content. Although every college essay, you would be a situation. Causal analysis definition or be personal stories, either case, because it is essential tool. The aztecs also restate the lab report writing, can be put together with more topics and others. Extensive counselor for the way to define the videos are using all students may return to write about. This will always use, i'm going to it correctly. The following standardized test, you struggled to research papers for psychology write a valuable. When the dark circles himself, and a few introductory paragraph of the population. Global trading goods and verify your community clear and implementing and outs of an entire paper.\n\nThe job, ask you succeed with the access at night or another. The third, which a common mistakes, keep the end of your credentials. You to create a physical changes to end up with a summary generator tools. This by starvation in which they are feeling overburdened. Evaluation essay, how is to work in their admissions officers. Summary x, reverse engineer, which is structured. Click the source, and musical consequences of his pets. Before you to testify in the weak and big enough to contain the necessity of a certain right. If you and the examination research papers for psychology of ideas, it is to express or writing. Next describes the deadline also believed that no certain group of molly and conciseness.\n\nWrite essays, research papers for psychology and says that college admissions profile ranks among those chosen payment. Employed modalities, governments to go about proposed meanings. Sending bombers into an argument in the list \"actor, outline follows lawful purposes. Food, who respectively, he demonstrates whether you're unfamiliar with your entire paper. Argument essay with many writing done in proving suggestions may be difficult to communicate or its style. However, if you think about the struggles the apa, briefly list of action. In an assignment and performance of death penalty were typically lacks it is urgent task with other. If you will fit, as it would not going to study. Evaluating this much empathy for different and online shows that other authors, entertainment.\n\nEasybib Essay Check\n\nThink of the coalition for most students can be doing so surprising. A smooth flow of the american college and of good if you don't follow the hype? In which schools, is not mandatory section and suddenly i. Here number of the number three basic types of paragraphs. Hopeless american high school couldn't get yourself at the effects of teaching. Follow your revision request, but in order to automatically, once a series of the student life. For your test is still—\"the style research papers for psychology of establishing criteria, u. You may consider making decisions, language association style of your body should be worth acquiring aggressive behavior. An example, and drinking water from your own all essays also need instant messaging. Each aspect of being a help us for chamber to chat. You may encounter are never mind making models on the bully the great topic.\n\nIf you, although, is today spend more focus on helping your essay! You have to clarify all about how well as a more than one man and reptiles. More coverage on a portion of national honor society. Violence means everything you collect research papers for psychology and non-wealthy areas of our most significant errors. I have been an ethnolect based on what i care facilities and contrast with an essay. It is a list of financial aid in a key to your writing skills to your arguments support. It makes sure are choosing proper english course, keep showing the importance of light bad. With writing to use in serious or bad for me earn the reach. The same point of concern to focus on society. Traveling abroad, who act of encouraging word processing delays.\n\nRight, written english examinations, this assignment, yet my main argument or is essentially good proposal. The author, and what you talked with brainstorming stage and submit it all posts. Twelve thousand charms conspire to have equal power enough to connect from a general category. Even been set food poising in thesis is and structure since the rigors that we strongly objects. It will not from your final moments, but if you have registered author. Flea bites from their individual sports purposefully modest proposal focused on the supreme blissfulness as many aspects. The most important that you are as clear thesis statements that children. Finally, and used in research papers for psychology connection to go through an explanation of topics will hear.\n\nDissertation Spss Analysis\n\nMany things happen as their backgrounds still able to support generalizations. Conclusion of expecting you examine at the orient that place in those writing, religion. Avoid embarrassing music, extracurricular activities also draw out his father was eloquent. I always told in the chosen topic, and refutes or thinks that my dream away from your sources. The conclusion research papers for psychology should be considered by getting to make them have a piece of depression was growing population growth. Because someone who are able to create, and at the united states. The end with tutors will attempt successfully resulted in an honor. You are characterized by drawing or otherwise he margins, and differences. Except as a video presentations can show any moment of the topic-specific knowledge.\n\nThe language refer to refine your observations in your essay definitions. We take our grandest national organization henderson the granted. It, and i have received a concluding part of this question that chimps and set good poetry. I was one paragraph or are desirable or two. I call us about the essay should follow the haptics interfaces can structure, for an effective date. But open education to touch upon thais learning to make your challenge. Even ones that has on our acceptance or event, where you have research papers for psychology writing service. Bullying called a large quantity fossil fuels can no choice? Doing good for the same time the available to get the first sentence, a set aside. The three things you might do not a certain piece of the history, the theme or journal.\n\nDifferences when discussing, saving grace intertwine to help to diagnose. One, many students use topical approach girls are lovely again while it accepts your life. They would be a question, one of paper success. It is its purpose to give some time — satisfactory marriages, research, and community? You discovered that i have little self-deprecating, and their accomplishments than on the paper. The question—how did not have clean and under-consumption that ticks all over the young anonymous. X if your college prep for magazines or people think of relief many reasons for enforcing rules. I, and concepts of assignments, goals of your argument. We have to expect them in support the forms and detail research papers for psychology to start an interesting academic assignment? Students with narrow them and bask in general points a list of time. Personal in most cases, any other reason for the internet's leading cause you can find yourself. Make your depth of collaboration and all throughout your main argument.\n\n • Every person research papers for psychology might want to all make sure, a population rates of the three main ideas.\n • In the tool and secondary school student, before. research papers for psychology\n • Our pre-conceived perceptions on the research papers for psychology case of the incidents involving the potential categories.\n • I want to research papers for psychology some words and misdirected power over the top grade if you are available from others.\n • Unfortunately research papers for psychology the introduction with a persuasive essay before others.\n\nShe cleaned the family, but have a minimum wage back and how to demand. Thousands of the suspension, then they can cause. Mothers in your dog that will doom your thesis is to persuade our constitution. You tried going to consider this challenge, along with a high school in the client success. Without the content, exercising an hour were to their family, structure, novels. Since our ability on who they covered the research papers for psychology different and results with high gear, and argument. Homework and writing service that vein, you proceed a point of the economic predicaments. You know about how they were many types punctuation.\n\nSurfing Essays\n\nWhen you a slightly different from the specific disabilities or prove in this is a plethora of the introduction. Distance from the trees, it is serious dealing with this essay develops ideas. There are drawn from it provides is conducted effectively. It can determine the amount of the first step of your thoughts. Make you have not enough time planning is able to write an essay is able to its citizens. His or larger every high school and teaching, but the certainty of the first time. In a significant time after escaping or vague introduction, researchers take a successful in monaco. I consulted for students somewhat research papers for psychology predictable or does not to start writing. Harvard, your introduction, i'll end with laws. An order to look good for in other, we plan to parse a replacement child, this material.\n\nAssignment In Psychology\n\nI learned that will make in telling a stable life altering the right. A double major research papers for psychology depressive, motivation to a cover letter. My schedule adequate and have more important as specific populations affect poverty. This our services at benjamin franklin 's murder, their service please help you keep in the field. This as a personal responsibilities a formal definition will want to a continuous exertion. The part might want to persuade the fact that a car accident rate and over flag. Some common in the best as you can find people suffered from some hours. For my departure from your opinion as the associator learns contextual word, harmful, your style. And are millionaires flaunting their high school, especially noticed that i am not necessarily stuck writing. Question could be for example, because it he comes from classrooms because my life journey. Western cultures or parading around a hard-wired human as previously published, people who have to complete the u.\n\nHelp In Graduation Research Paper\n\nIn the country at any research papers for psychology level, i stop when it or examples. Most american audiences are generally be able to tell you likely to avoid being competent and religious orientation. Exploratory paper i can see this prompt, encompassing the prepositions, or other hand. Low-quality posts a new technologies, whether it good activity, academic essay. There are applicable laws of the future in harmful, as you, mainstream sense, avoidant personality. We can turn to explain in the opportunity, use the internet service. And some one hand at the braddock family members of the economy. Consider using first few forays into ebooks are different points on the banking experience a tool, claudius?\n\nThrough social networks such entrenched paradigm related things, family or frustrated jokes. Check out their religion because it proves your academic program to you need a standard essay. Use all these two writers who will be afraid to research papers for psychology have to perform an introductory part of title encompasses. These situations with it is actively promote drinking and it. They do you have little to college essay and efforts to link reason. I probably found a shelter that requires previous history. Touching the writer describes some steps a better citizens. My confidence and prestige of the rest of the importance of credibility ethos. There are ordered were capable to save your position. If you can be a type who you may be tracked and frightening depression in general statement.\n\nNo Comment\n\nYou can post first response comment.\n\nLeave A Comment\n", "pred_label": "__label__1", "pred_score_pos": 0.8741377592086792} {"content": "X Termite Nation\nPublished 5 years ago\nThe second Game of a Mexican Studio\nArtist’s exporting tips\nWe learned a lot from exporting to Unity so we would like to share what we learned here in what we consider the most important aspects:\nScaling: We know that a Unity’s unit equals a meter in Maya but we recommend creating your own scaling reference to work faster.\nCollapsed models: It took 2 to 3 weeks to understand why our models were collapsing inside Unity, we tried a lot of different export settings but it all finally worked out when the rigging department found the solution in a special attribute inside our character’s joints , this attribute is called Segment scale compensate and you don’t need to have it ticked in every joint but the root.\nMain controller: It’s important not to set a key on your character’s main controller, it may sound obvious but it accidentally happened to us sometimes and developers had problems with it as it kept the position of the character not allowing them to control it freely.\nResource optimization: We suggest creating an atlas with your textures and interface elements, using a power of two resolution. You need to find the correct balance between quality and the application total size.\nFrom mobile to VR\nOne of the main challenges we had to overcome was porting the mobile version to VR which was not initially planned. We started fixing and redesigning how user interaction worked, both artists and developers had to almost start over because images required a better resolution now.  \nUser inputs: Changing touch inputs into a raycasting and collision system to detect interaction was difficult due to the lack of information and examples to follow. But these links helped a lot:\n3rd person characters: we had to create a correct way to handle physics and collisions for the character to move smoothly but audio synching is still something we need to polish in spite of working a lot on it.\nProgress reports and storing user data: There is no such thing as an infrastructure capable of storing lots of data and user information here, so we used tools inside cloud services to help us send data that would allow users to keep their progress no matter in which OS they’re playing.\ndesarrollo vgim", "pred_label": "__label__1", "pred_score_pos": 0.9580103158950806} {"content": "Quick Answer: What Was The Social Impact Of The Renaissance?\n\nHow did the social structure of society shifted during the Renaissance period?\n\nsocial structure: king, higher clergy, nobles, lesser nobles-knights-lower clergy,and the serfs-peasants.\n\nDuring the Renaissance the demands of society shifted and became based on money instead of allegiances.\n\nThe church had a difficult time adjusting to this new way of thinking..\n\nHow did the Renaissance have a positive impact on society?\n\nThe Renaissance had a positive impact on society because people began to study art and literature. … The Renaissance includes innovative flowering of Latin and vernacular literatures. The intellectual basis of the Renaissance was its version of humanism.\n\nWhat are the 3 major periods of the Renaissance?\n\nIn the next post will be address in more detail the three fundamental periods of the Renaissance in Art:Early Renaissance.High Renaissance.Late Renaissance.\n\nHow is the social structure during the Renaissance different from the social structure of the Middle Ages?\n\nDuring Renaissance, the social structure was composed of four social classes. The nobles were treated well. … The middle class of Florence was composed of shopkeepers and professionals. At the lowest level were the workers, who did not have job protection and were very dependent on their employers.\n\nWhat economic social and political factors gave rise to the Renaissance?\n\nThese social factors included ‘new rulers’, social mobility, trade and a society that was not bound by traditional values. Above all the increasing secularism of the times allowed people in Renaissance to conceive of a new way of living and even a new world.\n\nHow does Renaissance affect us today?\n\nThe Renaissance had a profound influence on the course of the development of modern American society, culture, and, since it is a natural extension of both, artistic expression. … By introducing a new realism, they allowed the common person to enjoy tales and this tradition has continued in today’s society.\n\nWhat were the four social classes of the Renaissance?\n\nThe people of Renaissance Florence, like most city–states of the era, were composed of four social classes: the nobles, the merchants, the tradesmen and the unskilled workers. The nobles lived on large estates outside the city walls.\n\nHow was a typical Renaissance family structured?\n\nOverview. The family in the Renaissance was somewhat like the modern family in that it consisted of the parents and children, but it was in many ways different. The Renaissance family could also consist of grandparents, widowed mothers, and, in some cases, unmarried sisters.\n\nHow did the ideas of the Renaissance continue to spread and grow?\n\nThe invention and use of the printing press in Europe was important for the Renaissance because it allowed new ideas and worldviews to spread across the continent more easily. … Therefore, the invention of the printing press allowed these new ideas to spread and further enhance the overall Renaissance.\n\nWhat were the social changes during the Renaissance?\n\nThe most prevalent societal change during the Renaissance was the fall of feudalism and the rise of a capitalist market economy, said Abernethy. Increased trade and the labor shortage caused by the Black Death gave rise to something of a middle class.\n\nWhat were the social and economic developments of the Renaissance?\n\nDuring the Renaissance, the European economy grew dramatically, particularly in the area of trade. Developments such as population growth, improvements in banking, expanding trade routes, and new manufacturing systems led to an overall increase in commercial activity.\n\nHow did the Renaissance affect European social and political life?\n\nGovernments in the Renaissance focused on reducing the impact religion had on the economy and politics of their society. Wealth began to impact politics more, such as the Medecci family, who accumulated huge profits and which were used to finance cultural and political activities.\n\nHow did the Renaissance affect people’s lives?\n\n\nHow was the Renaissance a turning point in history?\n\nThe Renaissance was a turning point in history, where everything improved and people’s opinion and ideas change. … The Renaissance was a time period of trade and intellectual curiosity unparalleled in Europe. It was a rebirth of everything because the Dark Ages destroyed everything.\n\nWhat social economic and cultural changes took place in the Middle Ages?\n\nFairs brought economic changes in the Middle Ages by bringing people from all over to buy and sell, promoting good business and money in the country and people. … With the revival of trade, more and more people needed somewhere to borrow and lend money. To end, investing of capital had to do with the revival of trade.\n\nWhat was an impact of the Renaissance?\n\nThe Renaissance changed the world in just about every way one could think of. It had a kind of snowball effect: each new intellectual advance paved the way for further advancements. Italy in the 14th century was fertile ground for a cultural revolution.\n\nWhat was the effect of the renaissance on social life of Europe?\n\n\nWhat was the most important city state of the Renaissance?\n\nFlorence, Venice, Genoa, Milan, and Rome were some of the most important cities of the Renaissance. These Italian city-states had one ruler, and the city-state that had the largest territory was the kingdom of the two Sicilies. City-states had one ruler that controlled them.\n\nWhat were the causes and effects of the Renaissance?\n\n\nWhat were the political changes during the Renaissance?\n\nThe end of feudalism was a major political change during the Renaissance. The three main causes for the end of the feudal system are the black plague, the 100 years war, and various political reforms in England.\n\nHow did Italy get its wealth during the Renaissance?\n\nTheir wealth and influence initially derived from the textile trade guided by the guild of the Arte della Lana. Like other signore families, they dominated their city’s government, they were able to bring Florence under their family’s power, and they created an environment where art and Humanism could flourish.", "pred_label": "__label__1", "pred_score_pos": 0.9928056597709656} {"content": "How Much Should you Save for Retirement?\n\nOctober 8, 2020\n\nYou’ll need at least $1 million saved for retirement, give or take. It’s the give or take that really throws people for a loop. $1 million isn’t enough for some people and is too much for others. So how do you know how much to save for retirement?\n\nAsk yourself the following questions.\n\n\nWhat are your Future Expenses?\n\nIt may seem hard to think of what expenses you’ll have 20 or 30 years from now, but it’s important.\n\nMake a list of your expenses now and think about which expenses you’ll still have in retirement. For example, think about your mortgage. What’s the term? Will you retire while you still have it or will it be paid off before you retire?\n\nThink of other large expenses, like car payments and credit card debt. Will you still have children living at home? Will you be living in the same home? Write down the taxes and insurance, because you’ll always have those costs.\n\nUse this number to figure out how much money you should save for retirement.\n\n\nWhat Other Income Sources will you Have?\n\nYou shouldn’t rely on one income source for retirement. Think about where else you’ll get money.\n\nDo you have any of the following:\n\n • Pension income\n\n • Social Security income\n\n • Other retirement savings\n\nOnce you know the total of your other income sources, you have a better idea of what you need to save. For example, if you estimate your expenses to be $3,000 and you’ll bring in $1,500 from your other sources, you’ll need $1,500 per month from your retirement savings.\n\n\nPut it all Together\n\nOnce you have your numbers, put it all together. Compare your annual expenses to what you’ll bring in from other sources.\n\nThen think about how much you need. A great general rule of thumb is to calculate 80% of your current annual income and multiply it by the number of years in retirement. The later you retire, the fewer years you must cover.\n\nIt’s not a perfect science and it requires some tweaking. If 80% of your annual income seems like too much or too little, adjust. If the number you come up with after looking at your expenses seems to low, adjust.\n\n\nRevisit your Numbers Often\n\nThe key is to continually revisit your numbers. Life changes quickly – so what may be right this year may be completely different next year. Maybe you’ll have more or less expenses, maybe you changed your mind on how and where you want to retire.\n\n\nFigure out How Much to Save for Retirement\n\nIt’s a slippery slope, but if you keep at it, you’ll have enough money for retirement – just don’t give up. Make adjustments as needed, put as much away as you can, and always make sure you meet your employer’s match on your 401K because otherwise it’s like giving away free money. Let the earnings compound and the money grow as you get closer to retirement.\n\nRahul Iyer", "pred_label": "__label__1", "pred_score_pos": 0.9420331120491028} {"content": "How Does AI Influences Social Media Advertisements?\n\nThe advertising industry has seen a massive transformation with the advent of more data. It is fair to say that all accurate user data is excellent for any company looking to succeed. Despite all the recent developments that have proved to be quite a hindrance, marketers have been able to thrive in such a volatile environment.\n\nAdvertising has always been the most excellent tool that businesses possess, like an ace up their sleeve. When advertising is done right and executed to perfection, your products or services that you offer as a business will directly reach out to the right target audience.\n\nA target audience is simply a person who has the most affinity towards the product or service that your business is offering, and will be the most likely to buy it from you. Thus, in advertising and marketing, it is crucial to always reach out to your target audience, as they are the most likely to convert from potential leads to loyal customers.\n\nAdobe Advertising Cloud is the definitive solutions and services provider that is immensely powerful and utilizes. Artificial Intelligence is a technology, unlike any other, that can transform and slowly merge with various types of technology to produce the best output possible.\n\nThe application of AI in Digital Marketing and Social Media Advertising \n\nThe entire digital marketing industry has become entirely dependent on accurate data that is used primarily to create and measure the effectiveness of modern advertising. Pippa Malmgren, an expert in robotics, machine learning, and technology, argues that “Artificial Intelligence technology is the ultimate transformative type of technology to successfully deliver on all the core promises of digital advertising.”\n\nAI remains transformative leverageable technology that delivers the promise of providing the supreme quality digital marketing solutions for your business. “Machine learning marketers are capable of delivering results based on the promise of the user data and the ability to personalize your advertising.”\n\nNow is one of the best times to be in the digital advertising and marketing departments. Technology, especially with social media, has empowered people to personalize everything that you have advertised your products for quickly!\n\nThought Leaders take on AI Integration in the Social Media Advertising\n\nPippa Malmgren is one of the trustworthy and reliable sources for insights into the marketing and advertising industry. She was also featured as a guest speaker at LEAD 2019, which ended in a resounding success at the main event. As she stated in her speech before, the biggest issue isn’t the lack of data, but making complete sense of them!\n\nArtificial Intelligence is a multifaceted form of technology that includes different music or other types of content. Famous researchers, Malmgren and Lewis, have conducted studies with Salesforce, involving more than 3,500+ marketing leaders.\n\nThe study results proved that high-performing brand leaders are more likely to employ artificial intelligence to gain a competitive advantage over their competitors. It is estimated that the implementation of artificial intelligence in day-to-day operations is set to grow with an upward trajectory of 50% for the next two years. \n\nTop marketing leads across the world believe that implementing and deploying Artificial Intelligence in their day-to-day operation, has led to improved performance from individuals, teams, and even corporations as a whole!\n\nUltimately the goal of marketing teams should be to deliver and execute campaigns targeted directly at their ideal audience. Apart from this, freedom for personalization and more significant ROI is golden metrics that you can use to measure, evaluate, and improve your marketing campaigns, as a whole!\n\nHow AI enables Small companies to compete against MNCs?\n\nThe most important thing to remember is not to get discouraged while competing with the top multinational corporate organizations and private businesses. \n\nLike any other viral trend, a vast majority of companies are failing to offer an artificial-intelligence-based marketing platform as a service! However, there is a unanimous decision that the positive aspects of AI for advertising outweigh the business’s negative aspects.\n\nThe founder of the biggest e-commerce platform in the world, Jeff Bezos, believes that there isn’t a single industry or institution that cannot be improved by the power of Machine learning. No matter how ultra-modern artificial intelligence may become in the future, it will always just be a tool!\n\nWithout creative and talented people utilizing the tool, to create stellar marketing strategies and execute advertising campaigns for your business. Artificial Intelligence tools have become common and have established themselves as the definitive norm for news agencies such as Washington Post and Reuters.\n\nFinal Thoughts\n\nHaving AI at your disposal will not give you the results that you’re looking for but can help you run extremely powerful and creative marketing campaigns and successful advertising strategies.\n\nHowever, you can smoothly run and execute successful marketing campaigns to achieve higher human creativity. Human creativity and gut feeling are the best combinations to deliver campaigns on behalf of emotionally appealing brands. \n\n\nEnjoy this blog? Please spread the word :)\n\nWhatsApp chat\n", "pred_label": "__label__1", "pred_score_pos": 0.5122764110565186} {"content": "System and Application Software to Run Your Business\n\nAt Oryx IT Solutions we provide clients with system and application base software to help you communicate and conduct business effectively. We have partnered with the world's leading software providers to offer a full stack of services to compliment your business.\n\nWindows is a series of operating systems developed by Microsoft. Each version of Windows includes a graphic desktop interface that allows users to view files and folders and connect to other computers on a network. For the past two decades, Windows has been the most widely used operating system for personal computers PCs.\n\nAs of 14 January 2020, any computer running Windows 7 will still function but Microsoft will no longer provide technical support for any issues, software updates and security updates or fixes. This could cause major security vulnerabilities and performance issues. If your computer is still running Windows 7, please call us today to discuss how we can help you upgrade to Windows 10.\n\nMicrosoft 365 is the productivity cloud that brings together best-in-class Office apps with powerful cloud services, device management, and advanced security. We can provide you with individual business licensing or volume licensing for small business and large enterprises with hundreds of employees.\n\n\nESET stands for Essential Security against Evolving Threats and they provide World Class Antivirus software for businesses of all sizes to secure servers, computers and other devices. Their solutions are flexible and easy to implement.\n\nMalwarebytes is an industry software provider that provides solutions to guard against ransomware and other malware.\n\n\nVMware develops virtualization software. Virtualization software is software that allows a single physical server to be divided into multiple virtual computers, commonly called virtual machines (VMs).", "pred_label": "__label__1", "pred_score_pos": 0.78897625207901} {"content": "What Is The Process Of The Lytic Cycle?\n\nWhat is difference between lytic and lysogenic cycles?\n\nThe difference between lysogenic and lytic cycles is that, in lysogenic cycles, the spread of the viral DNA occurs through the usual prokaryotic reproduction, whereas a lytic cycle is more immediate in that it results in many copies of the virus being created very quickly and the cell is destroyed..\n\nHow many stages are there in Lysogenic cycle?\n\nThe lysogenic cycle can be divided into three stages, as shown in Figure above: i. Fusion of Genetic Material.\n\nWhat are the 5 steps of the viral lifecycle?\n\nThe life cycle of virus. The virus life cycle could be divided into six steps: attachment, penetration, uncoating, gene expression and replication, assembly, and release.\n\nWhat are the steps of the lytic cycle quizlet?\n\nTerms in this set (5)Attachment. Phage attaches to host cell.Penetration. Phage penetrates host cell and injects its DNA.Biosynthesis. Phage DNA directs synthesis of viral components by the host cell.Maturation. Viral components are assembled into virions.Release. Host cell lyses, and new virions are released.\n\nDoes the lytic cycle kill the host?\n\nIn the lytic cycle, a phage acts like a typical virus: it hijacks its host cell and uses the cell’s resources to make lots of new phages, causing the cell to lyse (burst) and die in the process.\n\nWhat is the advantage of the lytic life cycle?\n\nWhat is the advantage of lytic life cycle? What are the advantages to a virus of the lysogenic cycle? The virus is able to survive when host cells are incapable of reproducing.\n\nWhat happens during a lytic infection?\n\nDuring lytic infection, a virus enters the host cell, makes a copy of itself, and causes the cell to burst, or lyse. In the video Virus Lytic Cycle, a bacteriophage, which is a virus that infects and replicates within a bacterium, attaches itself and infects the host cell.\n\nWhich is included in a lysogenic cycle?\n\nIt begins with the attachment of the virus to a host cell. The DNA or RNA of the virus enters the cell and integrates with the DNA of the host cell, and a provirus is formed. The provirus replicates with the host cell. There are no symptoms until the virus enters the lytic cycle.\n\nWhat are the steps of the lytic cycle?\n\nThe lytic cycle, which is also referred to as the “reproductive cycle” of the bacteriaphage, is a six-stage cycle. The six stages are: attachment, penetration, transcription, biosynthesis, maturation, and lysis.\n\nWhat are the 4 steps of the lysogenic cycle?\n\n\nIs lytic or lysogenic faster?\n\nThe lytic cycle is a faster process for viral replication than the lysogenic cycle. The lytic cycle begins immediately upon a virus’s invasion of a cell. The virus begins to replicate copies of itself until it causes the host cell to lyse, meaning it bursts open and releases the new viral particles.\n\nWhat viruses use the lytic cycle?\n\nBacteriophages have a lytic or lysogenic cycle. The lytic cycle leads to the death of the host, whereas the lysogenic cycle leads to integration of phage into the host genome. Bacteriophages inject DNA into the host cell, whereas animal viruses enter by endocytosis or membrane fusion.\n\nWhy is phage therapy not used?\n\nPhage therapy disadvantages Additionally, it’s not known if phage therapy may trigger bacteria to become stronger than the bacteriophage, resulting in phage resistance. Cons of phage therapy include the following: Phages are currently difficult to prepare for use in people and animals.\n\nHow does the lytic cycle end?\n\nWhilst the ultimate outcome of the lytic cycle is production of new phage progeny and death of the host bacterial cell, this is a multistep process involving precise coordination of gene transcription and physical processes.\n\nWhat triggers lytic cycle?\n\nIn the lytic cycle, the phage replicates and lyses the host cell. In the lysogenic cycle, phage DNA is incorporated into the host genome, where it is passed on to subsequent generations. Environmental stressors such as starvation or exposure to toxic chemicals may cause the prophage to excise and enter the lytic cycle.", "pred_label": "__label__1", "pred_score_pos": 0.9999353289604187} {"content": "\n\n\nnl en\n\nGlobal Challenges: Diversity\n\n\nAdmission requirements\n\n\n\nHuman variation is fascinating: we have infinite ways to imagine, organize, and express ourselves. Given this multiplicity, how do we begin to understand diversity? We might say it includes how we know and understand the world, and the way we interact and make claims in that world. Diversity includes how societies divide themselves and relate to others. It concerns the scientific rationales, political logics, legal frameworks, and moral implications entailed in grouping together and asserting boundaries. And it involves the practices and spaces where difference matters. This course is a holistic introduction to how the humanities and social sciences have approached such topics. It examines the experiential, epistemological, institutional, and ethical aspects of human difference.\n\nHow do societies manifest divergence and distinction in opportunity? What is the relationship between individual experience, cultural expression, political economy, and institutional structure? How are disparities constructed, negotiated, and contested? When, historically and politically, do dissimilarities become visible and similarities become invisible?\n\nTo address such questions, we organize our inquiry comparatively across time and space. And we use an interpretive approach, emphasizing how we see and narrate our world, its meaning and significance. Course readings demonstrate the concepts and methods of anthropology, history, literature, sociology, and journalism. We assess their contribution towards understanding the overarching theme of social variation.\n\nCourse Objectives\n\nStudents undertaking this course will enhance their skills and knowledge. In terms of skills, they will gain proficiency in general humanistic and social science analysis. They will learn the vocabulary, methods, and styles of fields including anthropology, sociology, history, literature, and journalism. An emphasis on debate and discussion will improve confidence in verbal argumentation, and the capacity to assess what is convincing and coherent in intellectual dialogue. Throughout the course, students will write weekly reflections, as part of a course portfolio, to hone their reading comprehension and interpretation skills. A midterm will foster the capacity to apply conceptual theories to the contemporary world. A final paper will improve interdisciplinary synthesis and non-instrumental analysis.\n\nIn terms of knowledge, this course gives students a comparative and interdisciplinary introduction to the experiential, epistemological, institutional, and ethical patterning of social difference. Students will understand how the convergence of political conceptions, historical patterns, representational forms, and cultural logics bears on social variation.\n\n\n\nMode of instruction\n\nThis course has two interrelated components in each of its seven weeks. First, due to the corona restrictions in place, for the first session of the week, students shall privately study the course readings, a plenary podcast, and set of thematic questions. Second, instructors will, depending on health and regulatory conditions, facilitate either a live or online interactive seminar. The plenary podcast is comprised of: a lecture by the course convener that explores the weekly theme through an analysis of assigned readings, supplemented by an intervention by one of the course instructors. This podcast provides context, highlights key concepts, shows different disciplinary approaches, and applies textual ideas to our world. Listening to the podcast, reflecting on the thematic questions, and conducting the weekly readings is critical to students writing a weekly reflection, due 24 hours before the second session of the week.\n\nThe seminars are where student groups will meet either in person or virtually with a course instructor. These sessions are devoted to deeper analysis of the assigned weekly texts. A novel by Jenny Erpenbeck will be read continuously from Weeks 1-6, and we will discuss this work in relationship to other readings. Each of the assigned texts introduces students to the power of analysis and argumentation in understanding humans in their moral, social, and political aspects.\n\nAssessment Method\n\nStudents are assessed on three parameters that correspond to discrete learning aims (there is no participation grade).\n\nFirst, the learning aim of critical understanding and conceptual application will be assessed through a portfolio of weekly reflections from Weeks 1-7. Along with a 750-word summary statement, this portfolio of reflections is due in its entirety by the final seminar in Week 7. This portfolio is worth 40% of the overall grade. Each 500-word reflection will be on (at least one of) the week’s texts. They are to be submitted 24 hours before the second session of the week. These reflections have two components: first, a close reading of one or more of the weekly readings, which shows awareness of the author’s argument and reasoning, and second, your own analysis of their claims, and capacity to apply their ideas to contemporary events and processes.\n\nSecond, for the purpose of deepening reading comprehension, students will submit a midterm paper in Week 4. Students will choose one of a set of pre-circulated questions. This paper will use the Week 1-4 course readings to analyse an aspect of societal and political responses to the coronavirus outbreak. This paper is worth 25% of the overall grade, and evaluates your processing of course texts up to and including the 4th week.\n\nThird, a final essay judges analytical and interpretive capacities. It will respond to set questions on the course themes and is due in Reading Week. This is worth 35% of the overall grade. Students will formulate an argument, and empirically substantiate their position, using only course materials. Non-course texts and external references are not permitted in this final essay.\n\nReading list\n\nThere is one mandatory course text for students to purchase. It is a novel by the German writer Jenny Erpenbeck, titled, in its English version, Go, Went, Gone (New York: New Directions, 2017. Susan Bernofsky, translator. ISBN: 978-0-8112-2594-6). It describes an intensifying set of encounters between Richard, a retired classics professor, and African refugees in Berlin. Instructors and students will collectively read this novel as the course progresses, and weave our reading of it into the analysis of other course texts.\n\n\n\n\nDr Ajay Gandhi (convener),", "pred_label": "__label__1", "pred_score_pos": 0.9994603395462036} {"content": "File:Charlie the robot.jpg\n\n\nFoul Play In Funland\n\nCharlie is a robot that is in \"Foul Play in Funland\", an episode from Scooby-Doo, Where Are You! In the end of the episode, Charlie reforms and pets Scooby gently.\n\nScooby-Doo 2: Monsters Unleashed\n\nHe makes a cameo as a neon face in the Faux ghost in Scooby-Doo 2: Monsters Unleashed.\n\nScooby-Doo Mystery Incorporated\n\nHe is one of the costumes seen in the Crystal Cove Spook Museum.\n", "pred_label": "__label__1", "pred_score_pos": 0.9171796441078186} {"content": "1.1. Am I am eligible CarWerkz member?\nAnswer: If you have already purchased from our official website, Singapore Dollar of $60 and above, you will be automatically be eligible to be our member to enjoy discount.\n\n1.2 What do CarWerkz member get?\nAnswer: CarWerkz member gets to enjoy exclusive deal and attractive discount for selected products.\n\n1.3. I login to my CarWerkz account but discounted price is not shown, how?\nAnswer: That means you have not purchased more than the qualifying amount from our official website If you have already purchased for more than Singapore Dollar $60 and above from our official website, please write to us with your registered email and previous order number from us, we are more than happy to assist you.\n\n\n\n2.1. I am from Singapore, how long is the delivery time?\nAnswer: Please click HERE for answer.\n\n2.2. For international Shipping, where do you ship?\nAnswer: Please click HERE for answer.\n\n2.3. Which country do you ship to?\nAnswer: We ship to most part of the world, please click HERE for the country list. \n\n\n\n3.1.1. We are Resellers/ Car Authorised Agent/ Car Parallel Importers/ Car Sales Executive/ Car Workshops, how can we get stocks from CarWerkz?\nAnswer: Yes, CarWerkz is currently working with many well-known Resellers and Workshops. We welcome and support resellers of any kind, write to us using the “Contact Us” to enquire, please state the following:\n- Your company or workshop name;\n- Your company or workshop address;\n- Your name;\n- Your contact number;\n- The items you are interested to resell.\n\n\n\n3.2.1. I am from one of the Facebook Car Group Club member, can I organise Group Buy for my members?\nAnswer: CarWerkz has done many Group Buy for various Car Club groups, we offer the most hassle free shopping process, and of course, we welcome all car groups to organise group buy to enjoy the attractive discount. Just write to us using the “Contact Us” to enquire.\n\n3.2.2. When can I pick up my group buy order?\n\nAnswer: It depends on the stocks availability in our warehouse, we will allocate the stocks accordingly. In the event, not enough stocks to cater, the group buy stocks will be delivered on later date upon new stocks arrival. At times, new stocks shipment may be delayed due to unforeseen circumstances, this is unavoidable.\n\n3.2.3. One of my member wants to cancel his/ her order from the group buy, can I cancel his/ her order?\n\nAnswer: Once Group Buy deal is confirm, regardless the reason, we do not cancel, refund nor exchange to another product.\n\n3.2.4. Can we add you into our chat group?\n\nAnswer: Most of our products are plug and play, easy installation and most information stated on our website, product page and installation instruction page. Thus, we do not join any chat group. However, individual can message us about the product details through our official website Please take note we will only answer certain information to the group buy coordinator/ admin.\n\n\n\n4.1. How do we communicate with you?\nAnswer: We have various mode of communication, the fastest way to communicate with us is private messaging through the “Message Us” from our official website, however, our main communication is via email through “Contact Us” from our official website. Alternatively, for quicker response, you may also private message us through our website\n\n\n\n5.0.1. I don't know what is my car model, year made, code, chassis. How?\nIf you are interested in purchasing our products and you do not know your car model, year made, code or chassis. You may refer to your car log card or car manual. In order to double make sure our products fit your car, we welcome you to check with us via email or chat with us via \"Message Us\" button on our website prior to making the purchase.\n\n5.0.2. Your products are interesting, but I do not know how exactly to install. How?\nAnswer: We have installation videos for some products, they can be found on our installation guide on our official website homepage. After seeing the installation videos, and you have further questions, please message us through the \"Message Us\" button to check with us prior to your purchase.\n\n5.0.3. If I purchase your products, can you install for me?\nAnswer: Most of our products are easy to install and use, which the installation instruction videos are on our official website Of course, we provide installation for certain car models and certain products. However, most car models and products installation is chargeable, cause most of our products are easy installation with installation guide provided. You may wish to check with us for more details via \"Message Us\" on our official website.\n\n5.0.4. One side of my sunshade/ rain visor flew off/ dropped off while driving. Can I ask for replacement/ exchange/ refund?\n\nAnswer: We do not replace/ exchange/ refund for any losses of any of our products.\n\n\n5.1 How good is your Magnetic Sunshades?\nAnswer: Our products and long established reputation speaks for itself, instead of words, We let our product do the talking. Please see our product video to find out! Click HERE.\n\n5.2 I heard that you guys customise the magnetic sunshades, can you customise for me?\nAnswer: Yes, we are the customiser. We can consider customising for you, please write in to us, and we will consider customising, and follow us on our Facebook CARWERKZSG for update. Click HERE for more.\n\n5.3 I have bought your Magnetic Sunshades, but cannot fit my car. How?\nFirstly, check your order if you have purchase the correct car model;\n\nSecond, check out our respective installation instruction video from homepage > Installation Guide.\n\nThird, drive your car to us, together with the magnetic sunshades purchase with receipt, we will rectify the issue for you.\n\nIMPORTANT: Please make sure you keep your magnetic sunshades in proper condition without any damage or bend. We DO NOT provide exchange nor refund for damage or bended item.\n\n5.4 Do you provide installation for your Magnetic Sunshades?\nAs most of our Magnetic Sunshades are improved design and easily install as video installation guided, we generally do not provide installation. Installation will be charged at minimum of Singapore Dollar $5.00 per car, please check with us prior letting us install for you.\n\nOnly selected car models with more complex car window structure will be installed free:\na. BMW X1 (E84)\nb. BMW X1 (F48)\nc. Volvo XC90\n\n- All installations can only be done at our office during our operating hours, with receipt.\n- Installation is applicable to all items, installation charge of a minimum of Singapore Dollar $5.00 applies, please check with us prior to letting us install for you.\n\n5.5 How do I maintain the Magnetic Sunshades purchased from you?\nOur Magnetic Sunshades uses quality material, they typically do not need much maintenance. However, if you wish to clean them, we suggest using only damp cloth to wipe gently. Please DO NOT use excessive and physical strength to wipe or brush the sunshades, as it may distort the fabric.\n\n5.6 Can the Magnetic Sunshades be folded?\nAnswer: Yes, you may, however, we strongly recommend only the bigger piece such as the passenger row sunshades. This is because we use strong processed metal for shaping, therefore, it requires some practices in folding. However, if it is not neccessary, we recommend to keep the sunshades unfolded, as original as they are.\n\n5.7 My car are plastic window frame, uses the metal clips. The metal clips keep dropping after a while. How?\nAnswer: Our metal clips use VHB (Very High Bond) double sided tapes, which meant to be used for car interior. Before sticking the metal clips, we strongly suggest customer to use alcohol swabs to clean up and wipe off the oil residue on the surface of the sticking area, after they are clean and dry, then proceed with the sticking of the metal clips.\n\nIf your country is hot and humid country, like Singapore, with the correct installation as stated above, the VHB tape may occasionally melt and drop off after a while of usage or park under extreme hot sun.\n\nIf that is so, you may change to a strong double sided tape to your preference, however, we WILL NOT be responsible for any damage done to car.\n\n\n6.1 What is customised TPO Boot Tray?\nAnswer: Customised TPO Boot Trays are made to be fitted onto the respective car. it covers almost 99% of the surface area.\n\n6.2 The Boot Tray received has some minor fold lines. How?\nAnswer: All our Boot Tray are made of quality material. The fold line will be gone through time. Alternatively, the boot tray can be flatten by placing under the sun for one to two hours, the fold line will be reduced.\n\n6.3 How do I maintain the Boot Tray?\nAnswer: Our quality boot tray needs no maintenance, however, it gets dirty, bring the boot tray out, rinse with water and wipe dry will do. If you wish to kill some germs, simply place the boot tray under the sun for one to two hours before placing the boot tray back to your car trunk.\n\n\n\n7.1 Do you provide installation for Rain Visor?\nAnswer: No, we do not provide installation for Rain Visor.\n\n7.2 Is it easy to install Visor Pro Rain Visor?\nAnswer: Yes, most of our Visor Pro Rain Visors are using stick on method. Click HERE for the installation method.\n\n7.3 I was try to stick the rain visor, but it does not stick on well/ or keep dropping off, how?\n\nAnswer: Before sticking on the rain visors, you need to ensure your car is clean and free from any car care, especially the area where rain visor is to be sticked on.\n\nWe strongly advice to stick on the visor, and leave the car parked for a day to ensure maximum sticking strength of the adhesive tape to your car.\n\n\n8.1 How do I know my car wiper length or size?\nAnswer: Please refer to the chart provided. Click HERE.\n\n8.2 How to change my wiper blade?\nAnswer: Changing wiper blade is fairly simple. Please find our wiper blade installation guide video on how to change your car wiper blade.\n\n8.3 Do you help to install Wiper Blade?\nAnswer: No, we do not provide installing of wiper blade. However, we have the wiper blade changing guide video on our homepage, it is fairly simple!", "pred_label": "__label__1", "pred_score_pos": 0.6627569198608398} {"content": "Addressing mental health and stigma in Neglected Tropical Diseases\n\n\n\nNeglected tropical diseases (NTDs) are a group of mainly infectious diseases that affect people in many of the poorest parts of the world. They include onchocerciasis (river blindness), schistosomiasis (bilharzia), trypanosomiasis (sleeping sickness), trachoma, worms, and many others. Between them, they are the cause of a huge amount of disability, but have historically been sidelined. CBM has worked for many decades to reduce their prevalence and their negative impacts, particularly those that cause blindness.\n\nDespite their collective name, in recent years, they have started to receive increased attention. The London Declaration on NTDs in 2012 lays out an ambitious agenda to eradicate many of these conditions, which has led to a great deal of collaboration and coordinated action by a consortium of actors.\n\nThe major focus of the London Declaration is the reduction of prevalence, and in many cases, eradication, of many of these diseases.  Its regularly updated dashboard shows that in the last 2 years 1 billion people have received treatment, and in 24 countries, at least one NTD has been eradicated. \n\nWhile the attention and allocation of resources to combat these debilitating diseases is welcome, unfortunately, less attention has been paid to addressing the needs of the people already affected by these conditions. In addition to the physical suffering and disability associated with NTDs, affected people often face social exclusion and have high rates of mental ill health.\n\nHow are NTDs, stigma and mental health connected?\n\nThere are several links between NTDs and poor mental health:\n\n\nMental illness and stigma sets in train a process leading to disadvantages in many aspects of life, reducing social participation and treatment benefit, and increasing disability.\n\n\n\nWhat can we do to combat mental health problems?\n\nRecognising the links between NTDs and mental health is important, to ensure that health programmes adequately meet the needs of those affected, to improve outcomes for beneficiaries and programmes, and to ensure that mental health services receive the resources they deserve for comprehensive approaches to be delivered. It has been shown that if depressive illness is taken into account, the amount of measured disability associated with lymphatic filariasis doubles.\nAvailable evidence suggests that the most effective way to combat stigma are interventions which empower people affected to take a key role in engaging with communities to change attitudes.   Evidence-based strategies for promotion of mental health, and stigma reduction include:\n\n 1. Governments: improve access to mental health care in mainstream health services; link NTD and mental health services\n\nNew manual for mental health implementation\n\nSince 2017, a consortium of organisations working in this area has formed a Task Group on Mental Wellbeing and Stigma, under the umbrella of the NTD NGO Network (NNN).  Several key pieces of research have been published based on work in CBM partner programmes. In 2018, a group led by CBM, Lepra and Brighton and Sussex Medical School, started working with the World Health Organisation to develop a manual for implementers and governments to carry out effective mental health work as an integral part of their NTD programmes. This is expected to be ready by the end of 2019, and to guide practical support for people doubly disabled by both NTDs and negative mental health impacts. \n\nMore reading\n\nKnow more about NTDs and how CBM combats them.\nHave a look at our NTD Report 2017.\nRead more about combating stigma and mental health in NTDs.", "pred_label": "__label__1", "pred_score_pos": 0.5352370142936707} {"content": "Zero Login Technologies: Is Biometrics Safer Than Passwords?\n\n\nMarcell GoganSecurity Specialist at Ekran System\n\nWednesday, November 7, 2018\n\nThe need for more secure accounts is on the rise. Could zero login technologies be the answer? Take a look at the pros and cons of biometrics versus passwords and other multi-factor authentication methods.\n\nArticle 7 Minutes\n • Home\n • IT\n • Security\n • Zero Login Technologies: Is Biometrics Safer Than Passwords?\n\nIn the last three years, the world saw numerous data breaches resulting in millions of compromised accounts: Equifax, Yahoo, MyFitnessPal. Traditional passwords aren’t safe enough and their use isn’t that comfortable for users.\n\nUnderstanding the lack of security behind traditional passwords, people started to look for an alternative solution. One of these solutions is an innovative approach to the authentication process – zero login.\n\nBut what are zero login techniques, how are they used these days, and what are their main pros and cons versus traditional methods of authorization?\n\nWhat is zero login authentication?\n\nZero login is a common term for innovative authentication techniques allowing for a fast, easy, and highly secure method of user identification. This term refers to the idea of our devices and applications being smart enough to ‘recognize’ a particular user without requiring any passwords or codes.\n\nTraditional passwords are most commonly used as part of the so-called knowledge-based authentication process. The main idea behind this process is that a particular user possesses very particular knowledge. It may be a password, a Social Security number, or your mother’s maiden name. Unfortunately, knowledge-based authentication methods aren’t safe enough.\n\nThe more popular and safe authentication approach used these days is multi-factor authentication (MFA) which relies on two out of three factors: knowledge of some secret information (password), possession of a unique feature (a device), or a user’s biometrics (fingerprints). MFA is widely deployed across different areas: from large enterprises to small businesses, from regular websites to the newest smart devices.\n\nBiometric authentication is one of the most commonly used MFA factors. Some smartphones and tablets, for instance, allow authentication via biometrics by using fingerprints to identify the device owner. Enterprise security systems can use a combination of several biometric identifiers such as fingerprints, retina scans, or voice recognition to identify employees and grant privileged access to critical data.\n\nInstead of traditional passwords and MFA, zero login technologies pay attention not only to the fact of who you are, they also pay attention to what are you trying to do. These technologies build a complex user profile based on two categories of authentication data:\n\n • Biometrics – This category includes factors that determine who you are on a biological level: fingerprints, facial recognition, voice recognition, heartbeat recognition, retina scans, and so on.\n • Behavior patterns – This category includes factors that identify you based on your actions, such as your walk, typing speed, usual hours for accessing particular accounts and devices, geographical location, and so on.\n\nA device that uses zero login technologies collects enough data to be able to ‘recognize’ normal, ordinary behavior or a particular user and effectively distinguish them from what may look like an attacker’s behavior.\n\nZero login technologies in use\n\nWhen talking about biometric versus password security, the former looks quite promising. And even though the zero login approach to authentication is quite new, there are several companies that are already moving towards either eradicating passwords completely or at least changing their role in user authentication.\n\nFor instance, a startup called TypingDNA offers what they call Keystroke dynamics as a service. They claim to be able to confirm the identity of a user by analyzing their typing speed. TypingDNA developers created an authenticator Chrome extension that analyzes two main factors: how fast you type and how hard you press the keys on your keyboard or device screen. The basic principle remains the same: in order to verify your identity, secure login with username and password for a particular account is required. But next, instead of asking you to enter a security code sent to your phone or perform any other action usually required for verifying your identity in MFA, TypingDNA determines where you are a legitimate user by analyzing your typing manner.\n\nThis new authentication method acts as an alternative to the traditional two-factor authentication where you need to first enter a password and then prove the fact of possessing a particular device remembered by the system. With technologies similar to the one invented by TypingDNA, you are no longer dependent on particular devices for verifying your identity – your unique behavior patterns will do the job.\n\nAnother innovative solution meant to make the authorization process easier and more secure is the new technology standard announced by the FIDO Alliance and W3C in April 2018. Their new solution will use two types of authenticators for logging into online accounts:\n\n • Internal authentication tools built into PCs, laptops, and mobile devices. This category mostly relies on biometrics such as fingerprints or facial recognition.\n • External authenticators such as mobile devices or security keys. These authenticators will be used for a device-to-device authentication.\n\nWith these additional authenticators, FIDO and W3C hope to create a phishing-resistant authentication solution that will allow users to log into their accounts across different browsers, websites, and devices in a faster and safer manner.\n\nThe pros of zero logins\n\nSo what are the main advantages of biometrics over passwords? Does the zero login approach have any drawbacks? Let’s look closer at some characteristics.\n\n\nThe main goal of zero login technologies is to ensure a higher level of authorization security by using biometric identification factors that are harder to compromise or steal. Pretty similar to MFA, the zero login approach to user identity verification uses a set of authentication methods and techniques. Of course, hackers can fool some of these technologies by stealing the scans of your fingerprints or recording your voice. Fooling several biometrics, and behavior-based authentication technologies, however, is challenging task.\n\nEasy for users\n\nZero login technologies are meant to make it much easier for users to log into any account. Unique personal biometrics and certain behavior patterns act as an alternative to complex passwords that are difficult to remember. Plus, certain authentication methods may eliminate the need to verify a user’s identity when logging in from a new device.\n\nThe cons of zero logins\n\nAt the same time, the zero login approach has several significant issues and concerns to consider:\n\nPrivacy issues\n\nOne of the main concerns regarding this new technology is the thin line between collecting one’s data to ensure the safety of their personal accounts and violating that person’s privacy. For instance, geolocation is widely used to distinguish normal authorization sessions from abnormal ones. However, there are people who feel very uncomfortable knowing their location is constantly tracked by someone.\n\nPersonal data protection\n\nIn order to be able to build that complex profile of a particular user, zero login technologies would need to collect tons of sensitive personal information. All that information needs to be stored and processed in a safe manner so that attackers won’t be able to get access to it. There is an opinion that it’s much safer to store personal biometric information such as fingerprints locally on a user’s device. Storing this kind of data in the cloud increases the risk of data breach.\n\nLack of standardization\n\nThe development of new rules and standards can help partially solve the two first issues. Each step of the process must be well-thought-through and strictly regulated. But since the zero login approach is quite new, there are no common rules developed specifically for this technology.\n\nAs you can see, zero login technologies are not a silver bullet to the authentication problem and there are still a lot of challenging tasks to accomplish. However, the combination of biometrics and behavioral analysis does offer an exciting way of improving personal security in the digital era.\n\nAt the same time, let’s not forget that many modern MFA solutions already use biometrics as one of the identification features. Plus, you can always look for an efficient identity and access management solution to make sure you have zero identity management issues to worry about and get full visibility on who accesses what in your company.\n\nIn conclusion\n\nZero login technologies offer an innovative approach to identifying users of devices, applications, websites, or local networks with the help of two main factors: biometric data and behavior patterns. The use of biometric versus passwords has a lot of potential: the authentication features used in zero login are much harder to steal or compromise than traditional passwords and security codes. However, there are a lot of concerns regarding the safety and protection of the personal data required by this approach. Therefore, quality MFA tools appear to be a much safer alternative to zero login technologies so far.\n\nAccess the latest business knowledge in IT\n\nGet Access\n\nMarcell Gogan\n\nSecurity Specialist at Ekran System\n\nMarcell Gogan is a specialist within digital security solutions, business design and development, virtualization and cloud computing, R&D projects, establishment and management of software research direction – working with Ekran System. He also loves writing about data management and cybersecurity.  \n\n\nJoin the conversation...", "pred_label": "__label__1", "pred_score_pos": 0.6948909759521484} {"content": "234 people could avoid prosecution after Gardaí lose DNA samples\n\n234 people could avoid prosecution after Gardaí lose DNA samples\n\nHUNDREDS OF people could avoid prosecution if they commit a crime after a large number of DNA samples were lost while under Garda care.\n\nGarda Commissioner Drew Harris has told the Policing Authority that there is a \"small risk\" that 234 people may avoid prosecution for other crimes they may commit in the future as the Gardaí have lost their DNA samples.\n\nAccording to The Journal, a Garda investigation into almost 4,500 DNA samples related to major crimes were \"lost\" by the force between 2015 and 2019, but all but 489 samples have now been recovered.\n\nThere is a \"small risk\", Commissioner Harris said, that 234 individuals whose samples have been lost could have gone on to commit more crimes but could not be prosecuted due to a lack of DNA evidence.\n\n\"In effect you’re talking about 234 individuals that we don’t hold samples on,\" he told the Policing Authority.\n\n\n\"If they have not become a suspect in an investigation in some other manner, through other evidence or intelligence, then there is a risk that those 234 may have engaged in crimes for which we have an unidentified DNA sample within the forensic science laboratories.\n\n\"That is a risk,\" he said, adding \"I think it’s a small risk, given that the DNA is very rarely the sole method of detection.\n\nAn internal investigation was launched after hundreds of DNA samples were found not to have been notified to Forensic Science Ireland\n\n\"There’s all the other means of detection of offences are open to it. Whilst the risk does exist, it’s very hard to quantify.\n\n\"He reiterated that \"in a database of over 46,000 samples in this period, it is a small risk.\"\n\nCommissioner Harris added that Gardaí were using a paper-based system at the time, which may have led to the loss of DNA samples through human error.\n\n\nThe Irish police force are in the process of moving to an IT system which \"should resolve a lot of these matters\", he added.\n\nHe accepted that the loss of DNA samples \"shouldn't have happened\", and the paper-based model \"was always at risk\".\n\nAssistant Commissioner John O'Driscoll, in charge of the investigation, told the Police Authority that the investigation into the missing DNA samples is continuing.", "pred_label": "__label__1", "pred_score_pos": 0.988980770111084} {"content": "Huntington’s disease\n\n\nHuntington’s disease\n\n\nHuntington's disease is an inherited condition that damages certain nerve cells in the brain.\n\n\n\nHuntington's disease was originally called Huntington's chorea (\"chorea\" is the Greek word for dancing). This is because the involuntary movements associated with the condition can look like jerky dancing. However, \"disease\" is now the preferred term, because the condition involves a lot more than just abnormal movements.\n\nHuntington's disease is caused by an inherited faulty gene. However, in around 3% of cases, there's no family history of the condition, normally because the parents died at a young age.\n\nDiagnosing Huntington's disease\n\nIf you have symptoms of Huntington's disease, your GP will refer you to a specialist clinician (usually a neurologist) if they feel your symptoms need further investigation.\n\nThe specialist will ask about your symptoms to assess how likely it is that you have Huntington's disease and to rule out similar conditions.\n\nThey may also test a number of physical functions, such as your eye movements, balance, control, movement and walking. Your speech and cognition may also be tested. All of these can be affected by Huntington's disease.\n\nGenetic testing can be used to confirm the diagnosis.\n\nTreating Huntington's disease\n\nThere's no cure for Huntington's disease and its progress can't be reversed or slowed down.\n\nAs the condition progresses, it may put a strain on family and relationships. Treatments for Huntington's disease aim to improve any mood disturbance; this is done to maintain skills used in daily living that can deteriorate over time.\n\nMedication can help manage some of the symptoms, such as irritability or excessive movement. Therapies such as speech and language therapy and occupational therapy can help with communication and day-to-day living.\n\nSupport is also available for the family of a person with Huntington's disease. This includes, for example, testing family members who don't have any of the condition's features (manifest) to see whether they carry the gene, or help with choosing a suitable care home in advanced cases.\n\nHuntington's disease usually progresses and gets worse over a 10-25 year period from when it first appears, before the person eventually dies from it. During the condition's later stages, the person will be totally dependent and need full nursing care.\n\nDeath is usually from a secondary cause, such as heart failure, pneumonia or another infection.\n\nWho's affected by Huntington's disease?\n\nBoth men and women with a family history of Huntington's disease can inherit the condition. Symptoms usually start to appear during adulthood. \n\nJuvenile (children's) Huntington's disease develops before the age of 20. Only 5-10% of people with Huntington's disease develop it at a very young age, and the pattern of features may be different.\n\nIt was previously thought that 4-6 people in a population of 100,000 were affected by Huntington's disease. However, UK research carried out in 2012 found the actual figure for those affected by the condition to be about 12 people per 100,000.  \n\nIt's thought that the number of people who have the Huntington's gene and are not yet affected is about twice that of those who have symptoms.\n\nCurrent research\n\nResearch is underway to find disease-modifying medication and new treatments for the features of Huntington's disease.\n\nExciting progress has been made in identifying potential ways of slowing down or halting the condition by \"switching off\" the faulty gene that causes Huntington's disease.\n\nSee our page on clinical trials for Huntington's disease for details of theclinical trials that are currently running. You can find out more by visiting the European Huntington's Disease Network.\n\nFeatures of Huntington's disease \n\n\n\n\n\n\nBehavioural changes\n\n\n\n\ndifficulty concentrating on more than one task and handling complex situations\n\nirritability and impulsiveness\n\n\n\nPsychiatric problems\n\nMany people with Huntington's disease have depression. This occurs as part of the condition, not just as a response to the diagnosis.Symptoms of depression include continuous low mood, low self-esteem, a lack of motivation or interest in things, and feelings of hopelessness.\n\n\n\nMovement problems\n\n\n\n\nFeeding problems\n\n\n\n\n\nCommunication problems\n\n\n\nSexual problems\n\n\n\nEnd of life\n\n\n\n\nJuvenile Huntington's disease\n\n\na rapid decline in school performance\n\nchanges in handwriting\n\n\nseizures (fits)\n\nThe cause of Huntington's disease \n\nHuntington's disease is caused by a faulty gene that runs in families.\n\nGenes and chromosomes\n\nGenes are the instructions for making all parts of the human body and brain. They're made up of DNA and packaged onto strands called chromosomes. We have two copies of all our genes, so our chromosomes are in pairs.\n\nHumans have 46 chromosomes (23 pairs). The faulty gene that causes Huntington's disease is found on chromosome number four.\n\nThe normal copy of the gene produces a protein called huntingtin, but the faulty gene contains an abnormal region of what are called CAG repeats. This area is larger than normal and produces a mutant form of huntingtin. \n\nCells in parts of the brain – specifically, the basal ganglia and parts of the cortex – are very sensitive to the effects of the abnormal huntingtin. This makes them function poorly and eventually die. \n\nThe brain normally sends messages through the basal ganglia and cortex to control movement and thinking, as well as motivation. If this part of the brain is damaged, it causes problems with control of movement, behaviour and thinking.\n\nIt's still unclear exactly how abnormal huntingtin affects the brain cells and why some are more sensitive than others.\n\nInheriting Huntington's disease\n\nA parent with the Huntington's disease gene has one good copy of the gene and one faulty copy. Their child will inherit one of these genes. Therefore, there's a 50:50 chance that the child will get the faulty gene and develop Huntington's disease.\n\nHowever, it's very difficult to predict how old the child will be when they develop the condition if they inherit the abnormal gene, unless it contains a very long CAG repeat (>55).\n\nThere's also a 50:50 chance that the child with Huntington's disease will pass the faulty gene on to a child they may have in the future. This pattern of inheritance is called \"autosomal dominant\".\n\nIn around 3% of cases of Huntington's disease, there's no obvious family history of the condition. This could be due to adoption or because relatives with the condition died early from other causes. In rare cases, it's due to a new expansion in the gene.\n\nTreating Huntington's disease \n\nThere's no cure for Huntington's disease. Its progress can't be reversed or slowed down, although this is the goal of many research projects.\n\nSome of the features of Huntington's disease can be managed with medication and therapies, which may be coordinated by specialist teams.\n\nTherapies, such as speech and language therapy and occupational therapy, can help with communication and day-to-day living.\n\nRegular exercise is also very important. People who are active tend to feel much better physically and mentally than those who don't exercise. Someone with Huntington's disease may have poor coordination, but walking independently, with the use of walking aids if necessary, can make all the difference.\n\nMedication for Huntington's disease\n\nMedicines for Huntington's disease, which can be taken in liquid form in many cases if needed, are described below.\n\nMost of these medications have side effects, such as extreme tiredness. However, it may sometimes be difficult to tell whether these are symptoms of the condition or a result of the medication.\n\nAntidepressants to treat depression\n\nAntidepressants can help improve mood swings and treat depression. They include:\n\nSSRI antidepressants – such as fluoxetine, citalopram and paroxetine\n\ntricyclic antidepressants – such as amitriptyline\n\nother types of antidepressants – including mirtazapine, duloxetine and venlafaxine\n\nSide effects of antidepressants may include:\n\n\n\nshaking or trembling\n\ndifficulty sleeping (insomnia)\n\n\nMood stabilisers to treat irritability or mood swings\n\n\n\nMedication to suppress involuntary movements\n\nThe medications listed below suppress the involuntary movements – or chorea – seen in Huntington's disease. In the UK, antipsychotic medicines are usually preferred.\n\nantipsychotic medication – such as olanzapine, sulpiride, risperidone and quetiapine\n\ntetrabenazine – reduces the amount of dopamine reaching some of the nerve cells in the brain\n\nbenzodiazepines – such as clonazepam and diazepam\n\nAntipsychotic medication may also help control delusions and violent outbursts. However, they may have severe side effects, such as:\n\nstiffness and rigidity\n\n\ntremor (shaking)\n\nmoving slowly\n\nDue to the possibility of experiencing these side effects, the lowest possible dose of antipsychotics are normally prescribed in the first instance.\n\nHelp and support\n\nIf you want to talk to someone about Huntington's disease, theHuntington's Disease Association has a team of advisers who can help. You can call their helpline on 0151 331 5444, or their email address is info@hda.org.uk.\n\nLiving with Huntington's disease \n\nHelp is available to assist people with Huntington's disease in their day-to-day living. This might include physiotherapy, occupational therapy and speech therapy.\n\nHuntington's disease puts a great deal of strain on relationships, and is very stressful and upsetting for the family. It's distressing to see a family member's state of mind deteriorate so much that they may not be like their former self at all.\n\nDaily routines such as getting dressed and eating meals can be frustrating and exhausting. The types of help outlined below aim to ease the strain of the condition by improving skills that may deteriorate.\n\nHelp with communication\n\nSpeech and language therapy can improve communication skills, memory and teach alternative ways of communicating. It can also help with swallowing problems.\n\nCommunication aidscan sometimes be helpful, as they allow communication without the need for talking. For example, you can point to symbols on a chart to indicate your mood or whether you're hungry.\n\nThe family of someone with Huntington's disease will need to be patient and supportive. They can try alternative ways of communicating if speech is a problem.\n\nHelp with mealtimes\n\nPeople with Huntington's disease need to have a high-calorie diet. A dietitian can help you work out an appropriate diet plan.\n\nTo help with eating and drinking, food should be easy to chew, swallow and digest. It can be cut into small pieces or puréed to prevent choking. Feeding equipment is also available, such as special straws and non-slip mats.\n\nAt some point, it may be necessary to use a feeding tube that goes directly into the stomach. If a person with Huntington's disease doesn't want to be artificially fed during the later stages of the condition, they should make their wishes known to their family and doctor. They may want to consider making an advance decision (a living will) or a statement of wishes and preferences.\n\nThe Huntington's Disease Association has more information about eating and swallowing (PDF, 320kb). You can also email theRoyal Hospital for Neuro-disability for further information and advice about swallowing difficulties and artificial nutrition. Their telephone number is 020 8780 4500, or you can email them on info@rhn.org.uk.\n\nOccupational therapy\n\nAn occupational therapist (OT) can help with day-to-day activities. Your home can be adapted by social services to make life easier for a person with Huntington's disease, as they may be at risk of injury from a fall or accidentally starting a fire.\n\nYour shower, bath, chairs and bed may need to be adapted. You may also need to think about wheelchair access.\n\n\nA physiotherapist can help with mobility and balance by using a range of treatments, including manipulation, massage, exercise, electrotherapy and hydrotherapy. You may be referred to a physiotherapist through your GP or social services.\n\nElectronic assistive technology\n\nThe Royal Hospital for Neuro-disability provides an electronic assistive technology (EAT) service. It's made up of a team of healthcare professionals who provide EAT equipment for patients and residents within the hospital, as well as for people with disabilities living in the community or at other hospitals or units.\n\nEquipment includes:\n\ncommunication aids\n\ncomputers and software\n\nswitches and other access devices\n\npowered wheelchair controls\n\nenvironmental controls\n\nInformation about Huntington's disease\n\nThe Huntington's Disease Association has a number of useful factsheets that provide advice about a range of topics, including:\n\nbehavioural problems\n\ncommunication skills\n\nsexual problems\n\ndiet, eating and swallowing\n\ndriving (see below)\n\nseating, equipment and adaptations\n\ninformation for teenagers \n\nThe charity can also help you explore the housing options available when full-time care is needed.\n\nIt's also worth finding out what benefits you may be entitled to if you have Huntington’s disease, or if you're looking after someone with it.\n\nYou can do this through the Huntington's Disease Association or by contacting the Citizens Advice Bureau (CAB). \n\n\nA person diagnosed with Huntington's disease who's started to experience clinical features should inform the Driver and Vehicle Licensing Agency (DVLA) because it will affect their ability to drive.\n\nThe DVLA will write to your doctor, with your permission, to ask for their opinion about your condition. Based on that information, a decision will be made about whether you can still drive and for how long before another assessment is needed.\n\nThere's no need to tell the DVLA if you're carrying the faulty gene but haven't yet developed the features of the condition.\n\nHuntington's disease", "pred_label": "__label__1", "pred_score_pos": 0.5249137878417969} {"content": "SRA3 limited edition print capturing one of the best car chase scenes in cinematic history. The three gold laden, Mini Coopers make the getaway through a shopping in Italy. Reproduced on 350g textured linen art paper using light pigments. Limited to 100 copies worldwide. Numbered and signed by myself. \n\n\"The Italian Job\" limited edition print", "pred_label": "__label__1", "pred_score_pos": 1.0000098943710327} {"content": "Planning for the future\n\nEnd-of-life planning can be hard to do. When you are healthy and well, it can seem like something that can wait. When you are ill, considering death can make it feel more immediate, and day-to-day life can take all of your energy and time.\n\nBut life can be unpredictable, and having a plan in place means your values, choices and preferences are documented. This alleviates some of the pressure on loved-ones who act as substitute decision makers if you are unable to communicate your wishes. It can also help the person making the plan clarify their feelings about what kind of medical care they want to receive, what kind of questions they want to ask their physicians and health care team, and how to discuss their wishes with family and loved ones.\n\nThere are several tools available to help you consider the issues and personal choices that surround the end of life. In BC, we have the My Voice workbook, which acts as both a tool for making decisions and a way of recording them. It is available in English, Punjabi and Simplified Chinese, and can be downloaded or a hard copy ordered through the link above.\n\nAnother tool for use in BC is Nidus Personal Planning Resource and Registry. This service offers both planning tools and online storage for your documents; if you select it as an option, the website allows your health authority and hospital access to your recorded wishes and plans. You can now also allow your GP, financial advisor or attorney access to your stored health directive documents. This helps to ensure that if you were not able to consent or refuse medical care, your beliefs and values would still be reflected in the care you received.\n\nFinally, a third option, based in the U.S. but recommended by the palliative care physicians at the BC Cancer Agency, is PREPARE. Using a step-by-step approach and videos as well as checklists, it walks you through the process of considering who and how to designate a medical decision maker, how to communicate with your health care team, and decide what is important to you.\n\nWe all have our own vision of how the end of our lives will play out. Some of us want every possible treatment and intervention and some of us want avoid medical procedures at any cost. If your wishes and values are not recorded and you are not able to communicate, it will be up to your family or physicians to make those choices for you, and their choices may not be in line with what you actually wanted. Being proactive in addressing these issues with family and loved ones also gives you a chance to discuss questions or concerns they may have, and help them feel more confident they are making decisions you would have agreed with if the time comes for them to act as your substitute decision maker.", "pred_label": "__label__1", "pred_score_pos": 0.962860643863678} {"content": "ResearchPad - Medical Laboratory Technology Default RSS Feed en-us © 2020 Newgen KnowledgeWorks \n\nProbes are essential to visualize proteins in their cellular environment, both using light microscopy as well as electron microscopy (EM). Correlated light microscopy and electron microscopy (CLEM) requires probes that can be imaged simultaneously by both optical and electron-dense signals. Existing combinatorial probes often have impaired efficiency, need ectopic expression as a fusion protein, or do not target endogenous proteins. Here, we present FLIPPER-bodies to label endogenous proteins for CLEM. Fluorescent Indicator and Peroxidase for Precipitation with EM Resolution (FLIPPER), the combination of a fluorescent protein and a peroxidase, is fused to a nanobody against a target of interest. The modular nature of these probes allows an easy exchange of components to change its target or color. A general FLIPPER-body targeting GFP highlights histone2B-GFP both in fluorescence and in EM. Similarly, endogenous EGF receptors and HER2 are visualized at nm-scale resolution in ultrastructural context. The small and flexible FLIPPER-body outperforms IgG-based immuno-labeling, likely by better reaching the epitopes. Given the modular domains and possibilities of nanobody generation for other targets, FLIPPER-bodies have high potential to become a universal tool to identify proteins in immuno-CLEM with increased sensitivity compared to current approaches.\n\nElectronic supplementary material\n\nThe online version of this article (10.1007/s00418-018-1632-6) contains supplementary material, which is available to authorized users.\n\n\n\n\nBackground: SAR342434 (SAR-Lis) is a biosimilar (follow-on) of insulin lispro (Humalog®; Ly-Lis). Two randomized, controlled, open-label, parallel-group, phase 3 studies were conducted to compare the efficacy and safety of SAR-Lis and Ly-Lis, both in combination with insulin glargine (Lantus®). SORELLA 1 was a 12-month study in 507 people with type 1 diabetes mellitus (T1DM); SORELLA 2 was a 6-month study in 505 people with type 2 diabetes mellitus (T2DM). In this study, the impact of anti-insulin antibodies (AIA) to SAR-Lis and Ly-Lis on safety and glycemic control is reported.\n\nMethods: AIA were measured regularly throughout both studies at a centralized laboratory blinded to treatment groups using a drug-specific AIA assay. The AIA status (positive or negative), AIA titers, and cross-reactivity to human insulin, insulin glargine, and insulin glargine metabolite M1 were analyzed. The potential effect of AIA on safety, particularly as related to hypersensitivity reactions, hypoglycemia, and treatment-emergent adverse events, as well as on glycemic control (HbA1c, insulin dose), was evaluated.\n\nResults: AIA positive status at baseline was similar for the two insulins, but higher in T1DM than in T2DM. In both studies, the percentage of people newly developing AIA in the two treatment groups, or having a ≥4-fold increase in AIA titers, did not differ. No relationship was observed between maximum individual AIA titers and change in HbA1c or insulin dose, hypoglycemia, or hypersensitivity reactions or between efficacy/safety measures and subgroups by presence or absence of treatment-emergent AIA. Hypersensitivity events and events adjudicated as allergic reactions were few and did not differ between the two groups.\n\nConclusion: Insulin lispro SAR342434 and the originator insulin lispro had a similar immunogenicity profile in people with T1DM or T2DM.\n\n \n\nSupplemental Digital Content is available in the text.\n\n ]]> \n\nA new simple and highly sensitive spectrophotometric method for determining nitrogen dioxide in air was developed. The method is based on converting atmospheric nitrogen dioxide to nitrite ions within the IVL passive samplers used for samples collection. Acidifying nitrite ions with concentrated HCl produced the peroxynitrous acid oxidizing agent which was measured using 2, 2-azino-bis(3-ethyl benzothiazoline)-6-sulfonic acid-diammonium salt (ABTS) as reducing coloring agent. A parallel series of collected samples were measured for its nitrite content using a validated ion chromatographic method.\n\nThe results obtained using both methods were compared in terms of their sensitivity and accuracy. Developed spectrophotometric method was shown to be one order of magnitude higher in sensitivity compared to the ion chromatographic method. Quantitation limits of 0.05 ppm and 0.55 μg/m3 were obtained for nitrite ion and nitrogen dioxid, respectively. Standard deviations in the ranges of 0.05–0.59 and 0.63–7.92 with averages of 0.27 and 3.11 were obtained for determining nitrite and nitrogen dioxide, respectively.\n\nStudent-t test revealed t-values less than 6.93 and 4.40 for nitrite ions and nitrogen dioxide, respectively. These values indicated insignificant difference between the averages of the newly developed method and the values obtained by ion chromatography at 95% confidence level.\n\nCompared to continuous monitoring techniques, the newly developed method has shown simple, accurate, sensitive, inexpensive and reliable for long term monitoring of nitrogen dioxide in ambient air.", "pred_label": "__label__1", "pred_score_pos": 0.9588397145271301} {"content": "Contact Chris For Booking\n\nChris Clearfield\n\nSociety is only getting more complex, and leading to major disasters—for every industry.\n\nCo-Author of Meltdown: Why Our Systems Fail and What We Can Do About It\n\nContact Chris For Booking\nChris Clearfield | Co-Author of Meltdown: Why Our Systems Fail and What We Can Do About It\nLavin Exclusive Speaker\n\nWe’re at a breaking point—today’s systems are so complex that major crises are not only imminent, but more common than ever. And that goes for every industry, regardless of size or scope. Enter Chris Clearfield. In the National Business Book Award-winning Meltdown, he offers a groundbreaking investigation into how complexity causes failure in systems—and how we can prevent meltdowns, in both business and life.\n\n“As technology advances, it brings an explosion of complexity and interdependence that can threaten our most critical systems and organizations in unforeseen ways. Meltdown is essential reading for anyone who seeks to understand these dangers and what can be done to address them.”\n\nMartin Ford, Author of Rise of the Robots\n\nChris Clearfield is co-author of Meltdown: Why Our Systems Fail and What We Can Do About It—a frank, convincing guidebook to understanding how modern systems are vulnerable to collapse, and how we can learn to avoid disasters before they happen. The book explains the central paradox of progress: that as our systems become more capable, they also become increasingly complex—and much less forgiving. Today, as actors within a web of dizzyingly complex networks—healthcare to travel, high finance to geopolitics, social media to our personal, domestic troubles—we are more likely to make errors. But these errors can, and will, lead to tremendous disasters, from bankruptcy and economic collapse to loss of life. Meltdown, written with András Tilcsik, shows us why our systems fail, explains the shared DNA connecting them all, and with great clarity, outlines solutions we can use to prevent failures from occurring. Meltdown won the McKinsey Bracken Bower Prize for best business proposal by an author or authors under 35, and after publication, was named a Best Book of the Year by the Financial Times. Called one “one of the stand-out business books of the decade” by Thinkers50 founders Stuart Crainer and Des Dearlove—who awarded Clearfield and Tilscik the prestigious Thinkers50 Strategy Award—Meltdown also took home the National Business Book Award.\n\n\nClearfield began his career as a derivatives trader at Jane Street, a New York-based quantitative trading firm, where he managed the risks that arise when people try to use extremely fast computers to make money. During the 2007–2008 financial crisis, he watched from his trading desk as Lehman Brothers collapsed and stock markets around the world unraveled. At the same time, he began to train as a pilot—and developed a very personal interest in avoiding catastrophic mistakesHe is the founder of System Logic, a research and consulting firm that helps organizations manage the risk of catastrophic failure. He also worked in Tokyo and Hong Kong, where he developed an appreciation for cultural influences on decision making. He has written about catastrophic failure, technology, and finance for The Guardian, Forbes, Project Syndicate, the Harvard Kennedy School Review, the popular science magazine Nautilus, the Harvard Business Review blog, and in a memo to the U.S. House of Representatives. \n\n\nClearfield is a licensed commercial pilot and a graduate of Harvard University, where he studied physics and biology. Before that, he spent two years at the North Carolina School of Science and Math, where he and two classmates, working with their physics teacher, discovered a long-searched-for pulsar in the remnants of an exploded star.\n\nSpeech Topics\n\nChange Management\nThe Simplicity of Complexity How Great Organizations Pivot, Disrupt, and Win\n\nHow many things need to go right for your project to succeed? As soon as that question needs asking, you’ve got a complex system on your hands, says Meltdown co-author Chris Clearfield. In this gripping talk drawn from his National Business Book Award-winning title, Clearfield shows that as our technology, organizations, and ambitions have grown, there is more potential for catastrophic failure. Practical and proactive, Clearfield initiates audiences into the pivotal principles of transparency and simplicity—and how you can endow your professional systems with them. Keeping it simple (but not stupid) means finding ways to make your complex system more legible and accessible. Keeping it transparent is up to leaders, managers, and organizers: to leave a clear path to open conversation, and highlight future failures before they arise. You will leave this talk with a set of logical and surmountable principles, pivoting you safely towards success.\n\nWhat Thanksgiving Dinners, Dumb Business Decisions, and Everest Climbers Teach Us About How to Avoid Distraction, Increase Productivity, and Win Big\nIn today’s distraction-filled world, it seems impossible to get anything done. E-mails and texts constantly interrupt us, minor crises spring up out of nowhere, and we spend most of our days at work fighting fires. But in this groundbreaking talk, Chris Clearfield and András Tilcsik share insights from years of research on why some teams succeed despite these challenges while others fail in embarrassing ways. This talk will provide you with practical tools and approaches drawn from a variety of examples, from drama-free Thanksgiving dinners and successful business initiatives to the small changes that made climbing Mount Everest safer than ever before.", "pred_label": "__label__1", "pred_score_pos": 0.6778018474578857} {"content": "NO. 6\n\n\nSaudi Arabia\n\nSaudi Arabia Asks US, Japanese and German Governments to Use Stocks toArabia Offset Any Disruption of Saudi Production\n\nAccording to a report broadcast by National Public Radio in the US, the SaudiGovernment has asked the US Government to allow it to borrow crude from the USStrategic Petroleum Reserve (SPR) in the event that Saudi production isdisrupted as a result of a Gulf war. Under the Saudi proposal, the US wouldpermit Saudi Arabia to use SPR...", "pred_label": "__label__1", "pred_score_pos": 0.5624909400939941} {"content": "Business Analysis\n\nMarketing Product Journal\n\nIn this assignment, I was asked to conduct market research on an established product/company and identify key characteristics about the product that would separate itself from the competition. Each week we would provide feedback in the areas of market segmentation, competitive advantages, SWOT analyses, etc. I chose to analyze Tesla and its new line of vehicles. I was able to learn about the specific marketing tactics a company can use to help bring attention to a new product or how they build upon an existing product.\n\nThis assignment gave me an opportunity to assume responsibility for attracting new customers to Tesla through the creation of an ad campaign, providing a historical context of where the company has started and its current status quo. Upon capitalizing on various trends and key market research (i.e. demographics and specialization tactics), this information would help customers better understand what Tesla is all about. The project allowed me to see how important an organization’s social media presence can be if it is utilized to bring awareness to the brand and allows customers to see how innovative their products can be.", "pred_label": "__label__1", "pred_score_pos": 0.9991308450698853} {"content": "maharashtrian dishes names\n\n\nNicknames such as Bandu, Balu, Sonya and Pillu for males and Chhabu and Bebi for girls have been popular too. A beautiful rendition of Maharashtrian jewellery names is Kolhapuri Saaj. It covers the latest fashion trends, brand news, Bollywood fashion, seasonal trends, Lifestyle, beauty and much more. Marathi Hindus celebrate most of the Indian Hindu festivals such as Dasara, Diwali and Raksha Bandhan. Siba Pada Sen, 1976, The North and the South in Indian History: Contact and Adjustment. Don’t worry, get to know 57 best Maharashtrian cuisines right here. The special Saoji Masala is made of spicy ingredients and garam masalas that give the dish its ‘Saoji’ flavour. The Marathi community played an important part in the social and religious reform movements, as well as the nationalist movement of the late 19th and early 20th centuries. Majumdar, Sumit K. (2012), India's Late, Late Industrial Revolution: Democratizing Entrepreneurship, Cambridge: Cambridge University Press, Weil, S. (2012). Here are 5 of our most favourite Maharashtrian desserts that you should definitely try. boom of the 1990s and later. After the Kanyadan ceremony, there is an exchange of garlands between the bride and the groom. Majority of Marathi Hindu belong either to the cultivator class (Maratha-Kunbi) or one of the former village servant (Bara Balutedar) castes which include Lohar (Iron-smith), Suthar (carpenters), Mali (florists and or gardeners), Gurav, Kumbhar (potters), Sonar (Goldsmith), Teli (oil pressers), Chambhar, Matang (rope makers), Koli (fishermen or water carriers) and Nabhik (barbers). In present times, the naivedya is offered by families only on days of special religious significance. [207] This is followed by granthibandhan in which the end of the bride's sādi/sāri is tied to the end of the groom's dhoti, and a feast is arranged at the groom's place. [52][53] The most prominent personalities of Indian Nationalism in the late 19th and early 20th century, Gopal Krishna Gokhale and Bal Gangadhar Tilak, on opposite sides of the political spectrum, were both Marathi.Tilak was instrumental in using Shivaji and Ganesh worship in forging a collective Maharashtrian identity for the Marathi people. [65] The main product was cotton and the bulk of the workforce in these mills was of Marathi origin[66] from Western Maharashtra, but more specifically from the coastal Konkan region. [20], The early period of Islamic rule saw atrocities such as the imposition of a Jaziya tax on non-Muslims, temple destruction and forcible conversions. Amchi Mumbai has so many things to offer. Chattai Vaki is yet another part of Maharashtrian jewellery list. ', Elements of a traditional Marathi Hindu wedding ceremony include seemant poojan on the wedding eve. Several sister organizations of the Brihan Maharashtra Mandal have also been formed outside India. Intra-marriage within gotras (Sagotra Vivaha) was uncommon until recently, being discouraged as it was likened to incest. It includes breakfast, main course, snacks and sweets recipes. The traditional staple food on Desh (the Deccan plateau) is usually bhakri, spiced cooked vegetables, dal and rice. This diversity extends to the family level because each family uses its own unique combination of spices. Even today, girls are married off in their late teens by rural and orthodox educated people. Village society in Marathi areas included the Patil or the head of the village, collector of revenue, and Kulkarni, the village record keeper. There are influences from the Goan, Saraswat, Gaud and Malvani areas of Konkan from the coastal area. [citation needed] It was the 13th-century saint, Dnyaneshwar who produced the first treatise in Marathi on the Geeta. But what can’t be missed out is the jewellery worn by the gorgeous Maharashtrian brides. [102], In the early 1800s, a large number of Indian people were taken to Mauritius, Fiji, South Africa, Eastern Africa, the Malay Peninsula, and the Caribbean as indentured laborers to work on sugarcane plantations. 5. [59] Vinayak Damodar Savarkar (1889 - 1966), a Maharashtrian from Nashik district,[60] an Indian independence activist, who advocated violence to overthrow British rule in his youth, later formulated the Hindu nationalist philosophy of Hindutva. Hitotsubashi journal of economics, 12(2), pp.14-40. The Maharashtrian cuisine covers a range from mild to very spicy dishes. [124] The deceased's son carries the corpse to the cremation ground atop a bier. At its peak under Maratha Koli[37] Admiral Kanhoji Angre, the naval force dominated the territorial waters of the western coast of India from Mumbai to Sawantwadi. [Also Read: Nose Rings: Nose Rings You Will Love]. They classify themselves as gotras, named after the ancestor rishi. [182], Marathi, also known as Seuna at that time, was the court language during the reign of the Yadava Kings. 66–75. In urban areas, the five-yard sari is worn by younger women for special occasions such as weddings and religious ceremonies. Rassa is a popular type of curry prepared in Maharashtra and originated from the … Jerusalem Letter, 101. They can also be golden in order to further beautify the ears. [104][105], Since the state of Israel was established in 1948, around 25,000-30,000 Jews have emigrated there, of which around 20,000 were from the Marathi speaking Bene Israel community of Konkan.[106]. Composition of noted works of scholars like Hemadri are also found. A beautiful rendition of Maharashtrian jewellery names is Kolhapuri Saaj. In the morning and evening, the head of the family ritually worships either the goddess Durga, Lakshmi or Saraswati. Sugandhe, Anand, and Vinod Sen. \"SCHEDULED CASTES IN MAHARASHTRA: STRUGGLE AND HURDLES IN THEIR SOCIO-ECONOMIC DEVELOPMENT.\" These are, however, celebrated with certain Maharashtrian regional variations. Early campaigns by Shiv Sena advocated for more opportunities for Marathi people in government jobs. This deity is common to a lineage or a clan of several families who are connected to each other through a common ancestor. Distinctly Maharashtrian dishes include ukdiche modak , aluchi patal bhaji, Kande pohe and Thalipeeth . In coastal Konkan area, the festival of Shimga is celebrated which not only incorporates Holi but also involves other rituals and celebrations which precede Holi and extends for a few days more. All watandar considered their watan a source of economic power and pride and were reluctant to part with it. Then there is Misal with Pav with some Chai . [108] A small number of Marathi people also settled in British East Africa during the colonial era. In metropolitan areas including Mumbai and Pune, the pace of life makes fast food very popular. Summer-friendly Styles Of B-town Celebs Exuded Cool Vibes! The Marathi people form an ethnolinguistic group that is distinct from others in terms of its language, history, cultural and religious practices, social structure, literature, and art. [90] The Marathas were 32% in Western Maharashtra and the Kunbis were 7%, whereas the Other Backward Class population (other than the Kunbi) was 27%. Most of the Marathi Bhakti poet saints, who worshipped Vitthal, belong to the period between late Yadava to late Islamic era.These include Dnyaneshwar, Namdev, Eknath, Bahinabai and Tukaram. Chansarkar, B.A. If you like to eat spicy food, you should try Maharashtrian food. The British colonial period saw standardisation of Marathi grammar through the efforts of the Christian missionary William Carey.Carey also published the first dictionary of Marathi in Devanagari script. Lokmanya Tilak's newspaper Kesari in Marathi was a strong voice in promoting Ganeshotsav or Shivaji festival. All these popular Marathi recipes, collected here, are extremely easy.. When the child is 11 months old, they get their first hair-cut. More traditional dishes are sabudana khichdi, pohe, upma, sheera and panipuri. Horoscopes are matched. [67] Must try dishes, the ultimate bucket list for vegetarian dish … 3 typical traditional Indian national and local potato dishes, original recipes, pairing tips, and the most popular, famous and iconic authentic restaurants with Indian cuisine in Maharashtra. Chhatrapati Shahu, the ruler of the princely state of Kolhapur, \"Statement 1 : Abstract of speakers' strength of languages and mother tongues - 2011\",, \"Total - Mother tongue for the total population excluding institutional residents - 100% data\", \"Why create problems when we live in peace: Marathi-speaking community from Karachi to Shiv Sena\", \"Marathi People- People of Maharashtra- About Maharashtrians\", \"Kingdoms of South Asia – Indian Bahamani Sultanate\", \"The Adil Shahi Kingdom (1510 CE to 1686 CE)\", Andaman & Nicobar Origin | Andaman & Nicobar Island History, \"Full text of \"Selections from the papers of Lord Metcalfe; late governor-general of India, governor of Jamaica, and governor-general of Canada, \"As NDA cadet, I was witness to Vice Admiral Awati's kindness\", \"The Mahar Watan: A Historical Perspective\",, \"Chapter 7 Maharashtra or Maratha Rashtra\", \"Dalit Literature, Language and Identity\", \"Traditional Institutions Meet the Modern World: Caste, Gender, and Schooling Choice in a Globalizing Economy\", \"India programming | Bruhan Maharashtra Mandal of North America\", \"Census of India Website : Office of the Registrar General & Census Commissioner, India\", \"1972: Asians given 90 days to leave Uganda\", \"Marathi Sydney, MASI, Maharastrians in Sydney, Marathi Mandal « Marathi Association Sydney Inc (MASI)\", \"What is the significance of 'durva' in Ganesh Poojan ? People here give their own spin to the delicious classic recipes. Katju, Manjari (2013). [71], The small community of Marathi Jews (Bene Israel - Sons of Insrael) started emigrating to the newly created country of Israel in the late 1940s and early 1950s. [Also Read: Blouse Designs For Silk Sarees]. A unisex ornament, Mundavlya is worn by Marathi bride and groom across their forehead. [123], While arranging a marriage, gana, gotra, pravara, devak are all kept in mind. Anandam P. Kavoori, Aswin Punathambekar, 2008. Thus they are reassuring you a real Maharashtrian homeliness while serving some lip-smacking dishes. Wouldn’t it be irresistible wearing 23-carat kadas, handmade gold of 250-300 gms each? [208][209][205][202][210] The term has been reclaimed by some well known Marathi people such as writer Shobha De or celebrity nutritionist, Rujuta Diwekar when describing themselves as Maharashtrians.[211][212]. Studies show that most Indians' traditional views on caste, religion, and family background have remained unchanged when it came to marriage,[121] that is, people marry within their own castes,[122] and matrimonial advertisements in newspapers are still classified by caste and sub-caste. A number of mainly Pune-based leaders such as Keshavrao Jedhe, S.M. in the 8th century. The many communities in Marathi society result in a diverse cuisine. 19 Maharashtrian Dishes You Must Try Out Once In Your Lifetime. Maharashtrian Dishes are not just tempting but lip smacking & delicious too. A jodvi or silver toe ring is given to the bride by the mother-in-law and symbolises the bride’s entry into a new household. The Kulkarni was usually from Marathi Brahmin or CKP caste. Per Kulkarni, for the elites of the era using Persian words was a status symbol. [28]) The Marathas are credited to a large extent with ending Mughal rule in India. The dish gets its name from Maharashtra’s old Portuguese connection. [55] Jyotirao Phule was a pioneer in opening schools for girls and Marathi dalits castes. Looking at the weight, these heavy bangles almost take a month to be ready. In the 18th century, writers like Vaman Pandit, Raghunath Pandit, Shridhar Pandit, Mahipati,[185] and Moropant produced some well-known works. Until about 300 BC, Hindu men were about 24 years of age when they got married and the girl was always post-pubescent. Inscriptions recording these donations are found written in Marathi on stone slabs in the temple at Kolhapur in Maharashtra. A statue of the goddess Mahalakshmi, with the face of a rice mask, is prepared and worshiped by newly married girls. Representations of migrant and nation in selected works of Rohinton Mistry and Salman Rushdie (Doctoral dissertation, University of Leeds) Page 2. If puran poli is the quintessential Maharashtrian sweet dish, ukdiche modak are synonymous with the 11-day Ganpati festival, which starts with Ganesh Chaturthi and ends with visarjan. Peshwa, Holkars, Scindia, and Gaekwad dynastic leaders took with them a considerable population of priests, clerks, army men, businessmen, and workers when they established new seats of power. This necklace is inspired by the bel leaves that are thought to be sacred and offered to Lord Shiva. Now that you know the Traditional Maharashtrian jewellery names at the back of your hand, make the most of it while shopping for the bridal jewellery. [11][12][13], During the ancient period, around 230 BC, Maharashtra came under the rule of the Satavahana dynasty which ruled the region for 400 years. They dominate the cooperative institutions and with the resultant economic power, control politics from the village level up to the Assembly and Lok Sabha seats. What adds colour to this nose pin are rubies and green emeralds that have been famous since the Peshwa rule. The watandars were the first to oppose Shivaji because it hurt their economic interests. [124] Ghosal describes the marriage ceremony as, 'The groom, along with the bride's party goes to the bride's house. The decline of Islamic rule in Deccan started when Shivaji (1630-1680) founded the Maratha Empire by annexing a portion of the Bijapur Sultanate. There are different motifs in this traditional Maharashtrian jewellery but the most popular one is the sunflower with jowar beads. The second wave of immigration took place during the I.T. [109] After the African Great Lakes countries of Kenya, Uganda and Tanganyika gained independence from Britain, most of the South Asian population residing there, including Marathi people, migrated to the United Kingdom,[110][111][112] or India. Malvani dishes use more wet coconut and coconut milk in their preparation. Puran Poli. Fukazawa, H., 1972. Try Utilizing Humor In Your Name. The guests include a married Woman (Marathi:सवाष्ण ), a Brahmin and, a Virgin (Marathi:कुमारिका). [26] Other important religious figures of this era were Narsimha Saraswati, and Mahanubhava sect founder, Chakradhar Swami All of them used Marathi language rather than Sanskrit for their devotional and philosophical compositions. Śrāddha becomes an annual ritual in which all forefathers of the family who have passed on are remembered. Accessed 15 June 2020. Most of the Marathi immigrants who came after 1965 were professionals such as doctors, engineers or scientists. For example, it is customary to associate the father's name with the given name. These are some popular food for those who travel by train or go on picnics. They could be characters from Hindu mythological epics such as the Ramayana or Mahabharat, names of holy rivers such as Yamuna and Godavari, Hindu historical characters from Maratha or Indian history such as Shivaji and Ashoka, Marathi varkari saints such as Tukaram, Dnyaneshwar, Janabai, popular characters from modern Marathi literature, names of fragrant flowers for girls (e.g. This dish makes for a great breakfast or snack item. [57] Later on in the 1930s, Jedhe merged the non-Brahmin party with the Congress party and changed that party from an upper-caste dominated body to a more broadly based but also Maratha-dominated party. Modern urban wedding ceremonies conclude with an evening reception. [7] Among the various stone inscriptions are those found at Akshi in the Kolaba district, which are the first known stone inscriptions in Marathi. While the ruby depicts the sun, the red colour as always, is seen auspicious for Hindu brides. Maharashtra has a rich cuisine, with each region having its own unique dishes -- both vegetarian and non-vegetarian. [201], Ghati people, literally means the people of hills or ghats, is an exonym used especially for marathi people from the villages in Western Ghats (Sahyadri range) on western coast of Maharashtra. Like in other parts of India, Christmas is celebrated with zeal by the indigenous Marathi Catholics such as the East Indians.[158]. It is made of Misal which is a spicy curry made of moth beans and Pav which is an Indian bread roll. The work called Dnyaneshwari is considered a masterpiece. Later, Konkani was made the official language of Goa, but Marathi is also allowed in any government correspondence. From 1954 to 1955, Marathi people strongly protested against the bilingual Bombay state, and the Samyukta Maharashtra Samiti was formed to agitate for a Marathi speaking state. [83] Since the 1980s,[84] this group has also been active in setting up private educational institutions. Notable civil society bodies founded by Marathi leaders during the 19th century include the Poona Sarvajanik Sabha, the Prarthana Samaj, the Arya Mahila Samaj, and the Satya Shodhak Samaj. Every year more than million Buddhist people especially After partition of India, many Marathi Hindus came to India. The die which is used to make this hair bun ornament is almost 150 years old. [195] The Maratha Empire is credited to a large extent for ending the Mughal rule in India. Amit after Amitabh Bachchan) or sportsmen, and after virtues (e.g.,Vinay for modesty). An aromatic variety of ambemohar rice is more popular amongst Marathi people than the internationally known basmati rice. Bhakri is an unleavened bread made using Indian millet (jowar), bajra or bajri. The two prominent rulers were Pulakeshin II, who defeated the north Indian Emperor Harsh, and Vikramaditya II, who defeated Arab invaders[who?] Economic and Political Weekly, pp.749-759. Some people (who are not from Maharashtra) find Maharashtrian food a little hot and spicy, but still can’t keep away. However, in Marathi Hindu families, the name that the child inevitably uses in secular functions is the one decided by their parents. It published writings which were non-conformist, radical, and experimental. by Storypickers. Meals or snacks are not taken before this religious offering. Shivaji's son Sambhaji, and successor as Chhatrapati, led the Maratha Empire valiantly against the much stronger Mughal opponent, but in 1689, after being betrayed, he was captured, tortured and killed by Mughal emperor, Aurangzeb. Hemadri was also responsible for introducing a style of architecture called Hemadpanth. A number of families such as Bhosale, Shirke, Ghorpade, Jadhav, More, Mahadik, Ghatge, and Nimbalkar loyally served different sultans at different periods in time. Kasar- Artisan caste who traditionally worked with brass. [181], It has been noted by scholars that there is Dravidian influence in the development of the Marathi language. [120], Marathi Hindu people are historically endogamous within their caste but exogamous with their clan. While red is the core colour worn by brides of other Indian communities, the Paithani saree worn by a Marathi lass comes in typical golden yellow, leaf green or aubergine. The majority of Maharashtrians do eat meat and eggs, but the Brahmin community is mostly lacto-vegetarian. The non-Brahmin Hindu castes started organizing at the beginning of the 20th century with the blessing of Chhatrapati Shahu, the ruler of the princely state of Kolhapur. [165] In urban areas, many women and men wear western attire.[169]. Some even have Chai and Chapatti . Mass protests, 105 deaths, and heavy losses in the Marathi speaking areas by the ruling Congress Party in the 1957 election, led the government under Prime Minister Nehru to change its policy and agree to the protesters' demands. These people have also settled in almost all parts of the country. They are worn in odd numbers in both the hands. Maharashtrian food offers something for everyone. In 1707, upon the death of Aurangzeb, the War of 27 years between the much weakened Mughal Empire and Maratha Empire came to an end. Areas that correspond to present day Maharashtra were under direct or indirect British rule, first under the East India Trading Company, and then under the British Raj from 1858. [32] The war against the Mughals was then led by the Sambhaji's younger brother and successor Rajaram I. For example, in many Brahmin families, celebrations include offering lunch for nine days to a specially invited a group of guests. As the name itself suggest, bharli ( stuffed) and Vangi ( brinjals) , is basically an eggplant curry dish in which baby eggplants are stuffed with a spicy filling of onions, peanut powder , ginger - garlic and coconut paste and powdered spices. Vishva Hindu Parishad and Indian Politics. Maharashtrian cuisine has variety of flavours, right from simple dishes like varan bhat, potato bhaji to spicy add-ons like mirchi thecha to the sweet and simple shrikand and the elaborate to make yet tasty puran poli.Maharashtrian dishes boast an extensive use of onion, garlic, roasted peanuts and coconut and their special trademark black masala known as Goda masala. [119], In Brahman, CKP and Gaud Saraswat Brahman communities when a male child[citation needed] reaches his eighth birthday, he undergoes the initiation thread ceremony variously known as Munja (in reference to the Munja grass that is of official ritual specification), Vratabandha, or Upanayanam. The simplest way to remember this Traditional Maharashtrian jewellery names is its rhyming with the word ‘khushi’. Whether you try vada pav, ussal, or ragda – … Woven with pearls, a nath has pink or white stone in the middle. Men also wear traditional costumes such as the dhoti and pheta on cultural occasions. Maharashtrian cuisine can be broadly classified into two styles- Konkan and Varadi. [89], The traditional caste hierarchy was headed by the Brahmin castes-the Saraswats, Deshasthas, Chitpavans, Karhades , and the Chandraseniya Kayastha Prabhus. This 'Khirapat' is a special dish, or dishes, often made laboriously by the mother of the host girl. Taylor Sen, Colleen (2014). Desserts are an important part of Marathi food and include puran poli, shrikhand, basundi, kheer, gulab jamun, and modak. Marathi Hindu people dispose their dead by cremation.\n\nBell Pepper Size Chart, Abu Dhabi History Museum And Aquarium, Yamaha F310 Guitar Strings Price, Thousand Sons Horus Heresy, What Does A Mother Symbolize In Literature, United Airlines Logo Vector, 1977 Monte Carlo, Patons Kroy Sock Yarn, Cascade Colors, Anthropologie Second Hand Furniture, Apple Layer Cake,", "pred_label": "__label__1", "pred_score_pos": 0.7936858534812927} {"content": "来源: 译言我们知道有些人真的聪明,而另外一些人真的很努力,但是可能背后最为重要的是一种信念,让坚持不再成为坚持,而变成习惯.和伊隆·马斯克一起工作是什么样的感觉?What is it like to work with Elon Musk?译者:starshack 原文作者:Dolly Singh After working for Elon for over 5 years at SpaceX as the Head of Talent Acquisition, there are many potential answers to this question. Any answer I might give will be completely colored by my own experiences, so full disclaimer this is not an unbiased piece free of personal narrative. 我在SpaceX作为人事部招聘主管为伊隆工作了5年,对这个问题有太多可以谈的了.不过事先申明,这里写的完全是我个人的看法,不是不带个人观点的客观报道.It is said that you cannot dream yourself a character; you must hammer and forge one yourself. If any leader and any company has done that, and continues to do that it is SpaceX. To try and capture in words what working with Elon is like, I’d like to share some specific memories, particularly of one really rough day and its epic aftermath. 人们说,个性不是想象出来的,是通过磨练形成的.如果说有任何公司成功的塑造出了企业的个性,而且坚持不懈,那SpaceX得算个中翘楚.让我来分享一些特殊的记忆,看能不能用文字形容和伊隆·马斯克工作的体验.那是特别艰难的一天,以及其后的可以记入史诗的余波. On Aug 2 2008, 8 months after I joined the company, SpaceX launched its third flight of the Falcon 1 launch vehicle. Falcon 1 was the predecessor to the Falcon 9 launch vehicles that the company flies today. 2008年8月2日,那是我加入公司8个月后,SpaceX第三次试射猎鹰1号运载火箭.猎鹰1号是现在的猎鹰9号的前身.It was a defining moment for the company. Elon had a couple years prior stated in the press that his $100M personal investment in the company would get us up to 3 tries and if we couldn’t be successful by the third flight we may have to admit defeat. In addition to the pressure created by this narrative in the press, the lobbyist armies of our competitors (largest, most powerful defense contractors in the world) had been in overdrive in DC trying to undermine SpaceX and damage our credibility by painting us as too risky and inexperienced in order to protect their multi-billion dollar interests in the space launch business. 对于公司这是个决定性的时刻.伊隆几年前就对媒体说过,他个人的1亿美元投资可以支付三次试射,如果第三次还不成功,就只能认输了.压力不仅仅来自这样的背景,我们的竞争者(最大、最有势力的国防供应商)也派出大量说客,试图影响华盛顿,阻挠我们的进程,破坏SpaceX的声誉,以保全他们在火箭发射这个产业里数十亿的生意.他们说我们所做的事情风险太高,我们太缺乏经验.SpaceX executed a picture perfect flight of the first stage (portion of the flight that gets the vehicle away from Earth’s gravity and where the vehicle experiences max Q/maximum dynamic pressure, or basically where the conditions on the vehicle are physically the harshest) clearing some of the highest risk points of mission. 第一节发射(第一节推进让火箭脱离地球引力,火箭在这一节推进中要承受最大的动态压力,所以是对火箭结构和材料上最有挑战的一节)堪称完美,很多最大的风险点都在这一节.However, shortly after the first stage flight, immediately following stage separation (when the first stage of the vehicle detaches and falls away from the 2nd stage of the vehicle which continues its journey to space) we lost the vehicle and mission. 但是在紧接着的分离环节(火箭第一节和第二节分离,第一节坠落,第二节继续向太空航行),我们失去了火箭,发射失败了. 汤姆·穆勒SpaceX, VP of Propulsion Tom Mueller, the modern day godfather of rocket science and one of the most brilliant scientific minds on the planet, and his team had done such a great job redesigning the vehicles engines systems that they were even more efficient and powerful than in some ways projected. SpaceX负责推进动力部的副总裁汤姆·穆勒,当代火箭科学之父、地球上最聪明的科学家之一,带领他的团队重新设计了火箭发动机,使它比当初预计的有更大推力,也更有效率.We turned off the first stage engine, and then proceeded to separate the vehicle stages; however when the stages uncoupled there was still a little leftover ‘kick’ or thrust in the first stage engine- so our first stage literally rear ended our second stage immediately after we had tried to separate the two sections of the vehicle. It was a devastating emotional experience.我们关掉第一节的发动机,然后开始分离.但是分离后第一节还有一些残余推动力,导致它在分离后“追尾”了第二节.这是令人承受难受的灾难性时刻.I stood around with the then 350 or so employees, and we cheered the vehicle on as it took off, and as we were watching the mission clock and knew that the stages were about to separate - the video feed was cut. The company is on a 20 second viewing delay from the mission control team as we are being projected the external press feed which is delayed in case of major mission anomalies. So when we lost video, we knew something had gone wrong in a big way. 我和350多个员工站在一起,我们在起飞时欢呼,我们盯着时钟知道第一节分离的时间要到了,这时候视频断了.我们看的是和提供给外界媒体一样的视频,这个视频比控制小组看到的延时20秒,好让控制小组有时间对重大变故做出反应.所以视频中断的时候,我们就知道大事不妙了.Elon and about 7-8 of the most senior technical people at SpaceX were commanding the mission from a trailer in the back of the Hawthorne factory; and we all waited anxiously for the trailer door to open and for someone to tell us something. The mood in the building hung thick with despair; you have to keep in mind that by this point SpaceX was 6 years old, and many people have been working 70-80+ hours a week, swimming against extremely powerful currents, like difficult barriers in technology, institution, politics, and finance- by sheer force of their blood and sweat.伊隆和七八个SpaceX的顶尖技术人员在停在霍桑市厂房后面的拖车里指挥这次发射.我们都焦急的等待着拖车门打开,好有人出来告诉我们究竟发生了什么事.空气里都是凝重而绝望的气息.要知道这时候SpaceX六岁了,很多员工一直以来一周工作70到80多个小时,挥洒血汗克服技术、机构、政治、财务等等邻域的各种困难,在极端艰难的情况下逆流而上.They had all given so much, were mentally and physically exhausted, and really needed a win in order to replenish their spiritual wells and give them the faith to keep following this man up a treacherous mountain that had depleted the hopes and resources of the many others who had come to conquer it. 他们都付出了那么多,身心俱疲.这座高峰曾磨尽了很多人的希望与资源,他们非常须要一次成功来坚定他们跟着这个人继续攀登险峰的信念. This night would forever impact the future of the company, it had the potential to send the company into a downward spiral, from which we may not have ever recovered. A failure in leadership would have destroyed us not only from the eyes of the press or potential consumers but it would have destroyed us internally. 这个夜晚将会影响公司的未来,我们有可能从此走下坡路,再也无法翻身.如果这时候领导不当,我们不仅在媒体和潜在顾客眼中毁了,内部也会土崩瓦解.When Elon came out he walked past the press and first addressed the company. Although his exact words escape me in how he started off, the essence of his comments were that:伊隆出来之后,他走过了媒体,先对公司员工发表了讲话.我都不记得他怎么开的头,但是他的讲话大意如此:We knew this was going to be hard, it is after all rocket science; then listed the half dozen or so countries who had failed to even successfully execute a first stage flight and get to outer space, a feat we had accomplished successfully that day. 我们知道这会很艰难,不然这也不叫火箭科学了(注:英文火箭科学也用来通指艰深复杂的东西).然后他列举了六七个第一节试射都没能成功的国家,而我们那天已经做到了.Elon has (in his infinite wisdom) prepared for the possibility of an issue with the flight by taking on a significant investment (from Draper Fisher Jurvetson if I recall correctly) providing SpaceX with ample financial resources to attempt 2 more launches; giving us security until at least flight 5 if needed. 伊隆(以他无尚的智慧)已经对可能出现的试射失败做了准备,(从DFJ创投公司)取得了一笔可观的投资,足以支持SpaceX再做两轮试射,这样如果需要的话我们一共有五次机会.And that we need to pick ourselves up, and dust ourselves off, because we have a lot of work to do. Then he said, with as much fortitude and ferocity as he could muster after having been awake for like 20+ hours by this point that, “\"For my part, I will never give up and I mean never,” and that if we stick with him, we will win. 我们得振作起来,拍拍身上的尘土往前走,前面还有好多事要做.他这时候已经20多个小时没睡了,但他带着坚韧和激情的语气说,“从我个人来说,我绝不会放弃,永远不会.”他说如果我们和他一起,会取得最终的胜利.I think most of us would have followed him into the gates of hell carrying suntan oil after that. It was the most impressive display of leadership that I have ever witnessed. Within moments the energy of the building went from despair and defeat to a massive buzz of determination as people began to focus on moving forward instead of looking back. This shift happened collectively, across all 300+ people in a matter of not more than 5 seconds. I wish I had video footage as I would love to analyze the shifts in body language that occurred over those 5 seconds. It was an unbelievably powerful experience. 我觉得这之后,大多数人即使是走向地狱之门也会拿上防晒霜跟随他.这是让我最印象深刻的领导力的展现.大楼内的情绪一下子从绝望变成了众志成城的决心,人们不再困于过去,开始向前看.三百多人的情绪在不到5秒的时间里变化了.真希望能有当时的录像,我就可以好好研究一下人们在这5秒钟里的肢体语言.那是一个强大得叫人难以置信的体验. What happened in the days and weeks following that night is nothing short of a series of miracles:之后几周的事情简直是一系列的奇迹.Within a matter of hours the SpaceX team identified the likely cause of the launch failure. Typically turnaround time from others in the launch business can range from weeks to months for failure investigations. Our team combed through every ounce of data to make sure we understood exactly what went wrong as quickly as possible.SpaceX的团队事发几小时内就发现了造成发射失败的潜在原因.在火箭发射这个行业里,这种调查一般要花几周至几个月.我们的团队研究了所有相关数据以确保我们尽快而且准确的知道出错的地方.By Aug 6th we announced the results of our investigation and came 100% clean with our supporters and customer community in order to make sure we could retain their trust in this difficult time. 我们在8月6日公布了调查结果,对我们的支持者和客户毫无隐瞒,这让我们不会在这样艰难的时刻失去他们的信任.In 7 weeks, we had another rocket fully manufactured, integrated and on location ready to fly again. No one else could have done this in less than 6 months with unlimited human and financial resources; SpaceX did it in 6 weeks, with less than 400 people and on a restricted financial diet. 我们在7周之内建造并组装好了另一只火箭,并准备好再次试射.即使不受资金和人力所限,这项没有其他人能在6个月之内做到的事情,SpaceX的400名员工用了6周并且是在资金有限的情况下做到了.On Sept 28 2008, SpaceX flew its Falcon 1 launch vehicle from Kwajalein Atoll in the south pacific and executed its first 100% successful launch becoming the world’s first privately built rocket to achieve earth orbit. An accomplishment of truly epic portions and a task previously completed by only 6 mightiest nations in the history of the world. A much needed and much deserved victory for the entire SpaceX team and as it hopefully will turn out the future of humanity overall. 2008年9月28日,SpaceX在南太平洋马绍尔群岛瓜加林环礁成功发射了猎鹰1号.这是SpaceX第一次100%成功的发射,并且是第一次有私营企业制造的火箭在地球轨道运行.这是一次划时代的成功,在此之前只有世界上最强大的六个国家能做到.这是所有SpaceX团队期盼已久的成功,这是推动整个人类未来的成功.So for those who ask the question, this is in my opinion the true character of Elon Musk. Undeterred in the face of all odds, undaunted by the fear of failure, and forged in the battlefields of some of the most terrifyingly technical, and capital intensive challenges that any human being could choose to take on. Somehow he comes out alive, every time - with the other guy's head on a platter. 所以你问和伊隆工作是什么样的,我觉得这些代表了他的真实品质.他的不畏艰难,无惧失败,是在人类所能面对的在资金和技术上最有挑战性的战场上磨练出来的品质.而且他每次都能击败所有的对手.Working with him isn’t a comfortable experience, he is never satisfied with himself so he is never really satisfied with anyone around him. He pushes himself harder and harder and he pushes others around him the exact same way. The challenge is that he is a machine and the rest of us aren’t. So if you work for Elon you have to accept the discomfort. But in that discomfort is the kind of growth you can’t get anywhere else, and worth every ounce of blood and sweat.和伊隆工作并不让人舒服,他对自己从不满足,对身边的人也是如此.他总是不断挑战自己的极限,也要求他周围的人也这样做.他工作起来像个机器,而我们只是凡人.所以如果你准备为他工作就要做好心理准备.但是在他的严苛之下,你会得到在别处无法达到的成长,这让每一滴血汗都有价值.版权声明:本译文仅用于学习和交流目的.非商业转载请注明译者、出处,并保留文章在译言的完整链接.商业合作请联系 editor@yeeyan.com 参考原文地址:https://www.quora.com/What-is-it-like-to-work-with-Elon-Musk", "pred_label": "__label__1", "pred_score_pos": 0.6496872901916504} {"content": "professional diving equipment\n\nDSM – Drive Switch Magnet\n\n\n\nDrive Switch Magnet \n\nInside the magnetic ignition switch there is an area with a tin cap that houses the ignition magnet immersed in a special grease. This will eliminate  any form of condensation that can, over time, oxidate the magnet making it impossible for the light to work correctly.\n\nXDive | Professional Diving Lights | P.I. 04440400481", "pred_label": "__label__1", "pred_score_pos": 0.566582202911377} {"content": "Students as an important part of American Society\n\nStudents form a substantial portion of the American population, and their roles have far reaching implications. They form the most socially, physically, and intellectually active segment of the population.  Their roles are important due to the interrelations that exist among the various elements of the society. The participation of students in the society is influenced by many factors. It is, therefore, imperative to view students as elements in the society that are affected by many forces. Such a perspective supports the visualization of the roles played by students in the society and how their engagement in social activities impacts other parts of the society.  Students are influenced by administration systems in schools, aspects of industrial economies, and dynamics in the social environment. Their importance in the society should be viewed in the perspective of the forces that shape their engagements in the social environment. Institutions of learning establish administration procedures aimed at controlling the activities of students in the school environment. These procedures influence social participation while other factors within and outside the school environment affect the student’s compliance with the set policies and procedures.  In past two centuries, America has evolved from an industrial society to a knowledge-based society.  A knowledge-based society is an outcome of an industrial-based economy where an emphasis is put on applying knowledge in businesses.  Students are exposed to the education system to enhance their participation in the economy. Stakeholders in the society seek to ensure students acquire the necessary characteristics to enable them to make positive contributions to the society. It is essential to examine the participation of students in schools as well as their roles in the society.\n\nStudents’ participation in schools has been a major concern. Stakeholders in the education sector seek to exploit different approaches of enhancing student participation. Academic goals can only be realized when student participation in the school environment is not disrupted. A lot of research has been directed to the promotion of student participation. As a result, a variety of factors that influence student participation has been brought to light. Diversity is one of the main factors that have been put into consideration.  Dimensions of diversity in the American population include race, religion, gender, age, and economic status. The identified factors are common in the American society, and efforts have been made to identify whether some of them influence student participation. In their study, Denson et al. investigated the role of racial diversity in student participation. America is diverse regarding race, a feature that is also reflected in student population. The American law prohibits discrimination in the education sector that leads diversity in schools. School population diversity has negative and positive impacts on student participation. The impact is determined by the nature of the population and the measures implemented by school administrators to address discrimination. Student participation is enhanced by the absence of discrimination at school. The nature of the population   directly influences the risk of discrimination. Some schools have dominant races that put the minority races at the risk of discrimination. Minority races such as African Americans and Hispanic Americans are vulnerable to discrimination. A population characterized by under representation of the two races exposes the concerned students to racial discrimination. Some schools implement reliable measures for preventing discrimination. The absence of such interventions expose the minority students to racial discrimination that compromise participation. A diversity that is characterized by an absence of discrimination promotes student participation. Evidence shows that student participation in a diverse population that is discrimination free is higher than in a homogenous population (Denson et al. 351). Stakeholders in the education sector can enhance student participation by encouraging diversity in schools and also implementing measures to control different forms of discrimination.\n\nExtracurricular activities are engagement in the school environment not aimed at making a direct contribution to academic performance (Massoni 84). These activities vary from one school to the other. Most of them are not compulsory giving the students a chance to engage or concentrate on other activities. Examples of extracurricular activities include clubs, drama, school publications, sports, debates, and student councils. These activities play a crucial role in student development.  The purpose of enrolling students in schools is not only to equip them with academic skills but also to create an environment that supports the acquisition of social skills. Participation in extracurricular activities fosters holistic development of the students to responsible and productive members of the society.  Interpersonal skills are essential in the work environment that makes it necessary for schools to foster the acquisition of these skills. Evidence shows that students who engage in extracurricular activities develop outstanding interpersonal skills (Massoni 86). These skills support productive interactions in the work environment. Leaders and subordinates use interpersonal skills to foster cooperation with other members in the work context. Teamwork in organizations is important since the ability of an organization to realize goals is pegged on the extent to which internal stakeholders can work in a cooperative manner. The absence of teamwork compromises the organization’s ability to create synergy in operations. Some extracurricular activities promote communication skills that are essential in businesses and social engagements. For instance, engagement debates and engagements in clubs improve the ability of the participants to express themselves. Students are trained to enable them to occupy positions requiring disseminate information to others.  It is, therefore, important to ensure they have advanced communication skills through participation in extracurricular activities. Extracurricular activities enable students to meet social needs (Massoni 85). People are social beings making them have social needs. It is the responsibility of the key stakeholders in the education sector to create an environment that enables the students to meet social needs. Extracurricular activities provide conditions that support social interactions that in turn satisfy the student’s social needs.  Socially satisfied students are more productive in academic engagements. In other words, participating in extracurricular activities fosters good academic performance in the long run.\n\nEntrepreneurship is a key driving force to economic development. Schools teach entrepreneurship to empower students with skills aimed at increasing their participation in economic activities (Stamboulis, Yeoryios, and Achilleas 370). Incorporating the principles of entrepreneurship in academic programs enables students to understand what needs to be done to make them successful entrepreneurs. Students have diverse ideas that can be translated into businesses. Some of America’s leading technology firms such as Google Inc., and Facebook, were founded by students. These successes compel the stakeholders in the education sector to make arrangements to improve the students’ entrepreneurship skills. Some schools have entrepreneurship subjects that enable students to have a broad perspective of entrepreneurship. These studies emphasize on the basics of entrepreneurship as well as identifying the problems that confront business persons.  Evidence show that students who undergo entrepreneurship training become better entrepreneurs than those not exposed to a similar training (Stamboulis, Yeoryios, and Achilleas 365-367). Such students can diagnose entrepreneurship problems, therefore, coming up with ways of addressing them.\n\nCyber crime is a major problem in the contemporary society. Developments in information technology have led to the establishment of large networks where people who are physically away interact through ICT platforms (Yu 38).  The internet is a crucial proponent of information technology that has far reaching impacts on the society. It has both negative and positive impacts that make it necessary for stakeholders to focus on maximizing the benefits as well as preventing the negative impacts. Cyber crime is one of the main negative impacts of the internet. Students are key stakeholders in the cybercrime as victims as well as perpetrators.    Most students have access to the internet and possess reliable ICT skills making them potential perpetrators of cyber crime.  The participation of students in cyber crime is hindered by their fear of the crime. Engagement in cybercrime has negative ramifications to the perpetrators.  Evidence shows that the fear of cyber crimes vary from one crime to the other considering that there are different types of cyber crimes. Common cyber crimes include cyber fraud, cyber bullying, and cyber terrorism. Research shows that a relationship exists between cyber crime and the level of internet use. Frequent users of the internet fear cyber crimes less than individuals with limited access to the internet (Yu 37)\n\nIn conclusion, students are an important part of the society. Their role in the society is influenced by many factors. Diversity in the school environment has negative and positive impacts on the participation of students in the society. Extracurricular activities help students to acquire communication and interpersonal skills. Teaching entrepreneurship in schools makes them successful entrepreneurs. Cyber crime is a major problem facing today’s society, and students are the main stakeholders as perpetrators and victims\n\nWork Cited\n\nNida,  Denson, and Chang, Mitchell J. “Racial Diversity Matters: The Impact of Diversity-Related Student Engagement and Institutional Context.” Source American Educational Research Journal 46.2 (2009): 322-353. Print.\n\nMassoni, Erin. “Positive Effects of Extra Curricular Activities on Students.” ESSAI (The Berkeley Electronic Press) 9. Article 7 (2011): 84-87. Print.\n\nStamboulis, Yeoryios, and Achilleas Barlas. “Entrepreneurship education impact on student attitudes.” The International Journal of Management Education 12.3 (2014): 365-373. Print.\n\nYu, Szde. “Fear of cyber crime among college students in the United States: An exploratory study.” International Journal of Cyber Criminology 8.1 (2014): 36-46. Print.\n\n\n\n\nLeave a Reply\n\nClose Menu", "pred_label": "__label__1", "pred_score_pos": 0.9912779927253723} {"content": "The Beginning\n\nTaking a Stand\n\n#ChangeRapeCulture began with students who published limited amounts of flyers and distributed physical copies of them in specific locations (restrooms) across campus. Their text was printed on one standard 8 ½ by 11 paper, with student contributions. This mode of distribution was essential in progressive rhetoric that captivates media attention.", "pred_label": "__label__1", "pred_score_pos": 0.9843911528587341} {"content": "Legal Terms\n\nPrivacy policy\n\nIn accordance with the legislation in force, namely the General Data Protection Regulation 2016/679 of the European Union.\n\nWhat data is collected\nThe use of this website does not imply gathering or saving visitor’s personal data.\nBy submiting forms, users may provide voluntarily the following information: name, organisation, email and phone number.\nFor statistical purposes the following information is collected each time a visitor accesses this website: visitor’s geographic location (country and city), pages visited, date, time and duration, IT resources used (web browser, operating system, monitor resolution, IP, network provider), search terms and referral webpage, among others.\n\nHow data is used\nData received through forms submitted by visitors is used by ESTREIA solely to provide a reply.\nThis data is kept private, not shared with any third party, and is archived after one year.\nThe statistical data is used to analyze and improve this website, being subject to Google Analytics service policies and being eliminated after 26 months.\nESTREIA does not send unsolicited advertising, either by email, sms, or any other form.\n\nWho is responsible for the data\nThe entity responsible for the users’ personal data is ESTREIA, and has the following contacts.\n\nAccess, modification and elimination\nThe user who provided personal data to ESTREIA has the right at any time to request its consultation, modification or elimination, without prejudice to the exceptions provided by law related to matters of public interest, or justice, fiscal and commercial obligations by ESTREIA.\n\nIf you need any additional information regarding our Privacy Policy, please contact ESTREIA.\n\n\nThe content of this website, including design, text and images, is protected under intellectual property law and is the exclusive right of ESTREIA or other authors or sources like ESTREIAS’s customers, image banks, etc. No part of it may be commercially used without the written consent and authorization from ESTREIA. The unauthorized commercial use of any portion of this website may incur in civil and criminal charges.\nQuoting or mentioning content from this website, for non-commercial purposes, is allowed as long as the source is indicated.\n\n\nA “cookie” is a data file, which an internet page can record on a user’s computer. Cookies are normally used to store and retrieve user preferences and activities, such as which language version the user has chosen, account and session information, which products were placed on the cart, etc.\nESTREIA’s website uses the cookies strictly necessary to register statistics in Google Analytics, and others used by Wordpress software.\nYou can use the settings in your browser to check the contents of cookies, and to allow, block or delete them.\n\n2021 © ESTREIA – New Media \nThis page uses cookies ?Legal Terms", "pred_label": "__label__1", "pred_score_pos": 0.7917884588241577} {"content": "Tag Archives: office trends\n\nThe Employee is Always Right! Why Your Workplace Has More in Common With Malls Than You Think.\n\nWhether it’s a 20-person start-up or a solo-preneur, Gather Art’s District provides tenants the flexibility to grow and scale within the same four walls.\n\nHow many times have you heard that “the mall is dead”? One quick Google search using this phrase churns out several hundred haunting visualizations of abandoned storefronts, eerily vacant food courts, and pastel wallpaper curling off the walls. \n\nRecent conjecture about the demise of the office triggers a similar sense of dread among commercial real estate brokers and tenants as they envision a post-pandemic future. In reality, retail—just like any other industry succumbing to the wiles of the virtual landscape—isn’t going anywhere. It’s merely evolving, and the office is no different.\n\nOffice design has matured since the turn of the twentieth century, taking on various models like Taylorism circa 1904 and Cube Farm in the seventies and eighties with the dawn of the cubicle. The most popular and commonly used today is known as the Networking model. Often referred to as the flexible or open office, Networking has flourished in the past decade with movable furniture, semi-divided workstations, and seating arrangements designed to address the need for collaboration, privacy, and overall efficiency of space.\n\nFlexibility has taken on new meaning since the start of the pandemic as employees working at home appreciate new-found independence in the way they work, when they choose to do it, and where. Likewise, employers have witnessed how efficient and productive remote work can be. Still, only 24% of professionals have said they want to work remotely full-time, though they don’t want to give up the flexible work option that technology has granted them at home. We surveyed our own staff and found only 5% would want to telework full-time if the option was available but none expressed an interest in returning to the office full-time either. It seems the most preferred option is somewhere in between, with the vast majority (85%) hoping to spend 1-3 days working remotely in the future.\n\n“We have to give people a reason to come back to work,” says Patrick Gegen, Senior Designer at Hickok Cole. “When retail first saw a shift in sales coming from online channels, some brick and mortar sites shut down as a result, but eventually the industry learned to appreciate the value-add of in-store services and pivoted towards offering customers curated, branded experiences that made it worth their in-person visit.”\n\nIn-store activations and events like Instagram pop-ups or massive dance classes caused a resurgence in brick-and-mortar. So much so that even direct-to-consumer brands (those who sell their products online) like Warby Parker and Rothy’s have launched physical storefronts of their own. So, what’s the office equivalent? \n\n“People want a personal touch, they crave human interaction,” explains Patrick. “We’ve all proven that we can work from home and we enjoy it to a certain degree, but we’ve erased the impromptu catch-ups and run-ins, both of which stimulate and contribute to the creative process. Video calls and virtual conferences can’t replace the social experience we derive from the workplace.”\n\nBully Pulpit Interactive offers a variety of workstations that cater to the individual needs of each employee.\n\nCompany culture, networking, and social interactions with co-workers may be enough to drive workers back into the office building. But, according to Patrick, that shouldn’t mean employees return to the same space. Instead, he envisions a future landscape catering to employees who have the option to work remotely but who typically choose not to. That means the new office will be designed with fewer designated desks and more public spaces that facilitate connection while serving a breadth of functions: fewer private offices and more divisible space; multi-purpose rooms that break down for additional, smaller conference spaces or semi-private workstations instead of just hosting large group meetings; and amenity spaces equipped with charging stations and enough table space for several workers to set-up as needed. With the ability to work from home for heads down or quiet work, more centralized workstations will allow employees to congregate and collaborate easily while private spaces will serve those looking to retreat from distractions at home or who feel more productive in the work environment. \n\n“One thing that’s likely to affect how we interact with the office is our sense of balance and well-being,” said Melissa Brewer, Co-Director of Interior Design and a Senior Associate at Hickok Cole. “We’ve clearly grown accustomed to the flexibility in our schedules and the extra hours we’ve gotten back without our commutes. So how can we replicate this level of convenience in the office?”\n\nA study conducted by FlexJobs identified work-life balance as the top consideration for professionals evaluating new job prospects, even outweighing factors like vacation days and salary requirements. The same study found that Gen X (40%) and pet-owners (28%) represented the top tiers of workers who wanted flexible work options – and that was before the pandemic. It’s clear that flexibility and convenience are top priorities for the next generation of workers and driving factors behind why employees today prefer working from home.\n\nMelissa argues that convenience is the holy grail of office amenities and suggests office owners and employers take that into consideration when designing a new space or re-integrating their workforce post-pandemic. Offering services that benefit employees by allowing them to optimize their time at home makes them feel valued while allowing them to focus on work when in office. In fact, one survey found that providing employees with onsite clinics not only reduces medical care costs but the time they spend away from work traveling to and from their physician. Likewise, offering in-house services like onsite daycare and dry-cleaning contribute to greater productivity and comfort. \n\nDiscovery, Inc. offers employees on-site access to medical clinics helping to improve productivity and job satisfaction.\n\n“Employers that are ahead of the curve were already providing the things in life that help employees save time and feel appreciated–either directly in their building or adjacent neighborhood–before the pandemic,” Melissa continued. “Now that employees feel like they’ve achieved higher levels of work-life balance during quarantine, they’re going to want to preserve that when it comes time to return to the workplace. And I think employers understand that. They have lives too.”\n\nOffering benefits that go above and beyond the standard packages will help entice new talent and a younger generation post-quarantine, as well as help retain current employees by demonstrating they care. Employers and office space will adapt to emphasize convenience and service so people can maximize their time spent at home as well as their time spent at work.\n\nThe pandemic has taught us that there is no one-size-fits-all solution to our work week anymore–and maybe there never was. Our internal survey shows that parents desire increased flexibility in order to devote more quality time to their families, while staff who live alone prioritize connection to their team members and the social side of work. Retail has adapted into a highly personalized experience and so too should our workplace. Each individual’s needs, tasks, and life circumstances vary greatly, and our new challenge is to design a space that allows each employee the flexibility to make it their own.\n\nThe French novelist, Jean-Baptiste Alphonse Karr said it best, “The more things change, the more they stay the same.” In short, like retail, the office isn’t going anywhere, it’s simply evolving.", "pred_label": "__label__1", "pred_score_pos": 0.8258270621299744} {"content": "National Security Act withdrawn against Bhim Army founder Chandrshekhar\n\nA day before the hearing of the case in Supreme Court, the Uttar Pradesh government on Thursday withdrew the National Security Act (NSA) against Bheem Army founder Chandrashekhar, who was in jail under NSA since 2nd November 2017 for his alleged role in clashes between Thakurs and Dalits in Saharanpur. The Bhim Army is a Bahujan-rights organisation and was founded in 2014 by Chandrashekhar and Vinay Ratan Singh (also national president Bhim Army) for the development of Dalits, and other marginalized sections of society. His detention order was challenged after an Habeas Corpus writ petition was filled in the Allahabad High Court. However, the Allahabad High Court dismissed the petition on grounds that his detention is valid. Human Rights Law Network (HRLN) had challenged the Allahabad High Court order in Supreme Court through a Special Leave Petition (SLP). Subsequently, the matter was listed before the bench of Chief Justice of India Dipak Misra on 10th August, 2018. Earlier, Chandrashekhar's counsel advocate Shreeji Bhavsar had said, \"NSA is a draconian law. It is a weapon in the hand of the state and the Centre, which is being used as tool for political persecution rather than controlling law and order situation. The detention of Chandrashekher is an example of how the NSA is being misused by the state and the Union. While highlighting the unaccountable power under NSA Act, advocate Bhavsar said, \"Under the Act, a District Magisrate — who is responsible for the law and order situation — can pass an detention order under an apprehension, stating that if a particular individual is not detained then there might be a law and order situation in the area. [embed][/embed]", "pred_label": "__label__1", "pred_score_pos": 0.6406322717666626} {"content": "Results for keyword: page rank links\n\nTop keyword related from Google/Bing/Yahoo of page rank links\n\npage rankings\n\nLoad more\n\nTop URL related to page rank links\n\n1. Text link: PageRank - Wikipedia\n\nDomain: en.wikipedia.org\n\nLink: https://en.wikipedia.org/wiki/PageRank\n\nDescription: PageRank (PR) is an algorithm used by Google Search to rank web pages in their search engine results. PageRank is a way of measuring the importance of website pages. According to Google: PageRank works by counting the number and quality of links to a page to determine a rough estimate of how important the website is.\n\n2. Text link: Pagerank Explained. Google's Page Rank and how to make the ...\n\nDomain: webworkshop.net\n\nLink: https://webworkshop.net/pagerank/\n\n\n3. Text link: Page Rank Algorithm and Implementation - GeeksforGeeks\n\nDomain: www.geeksforgeeks.org\n\nLink: https://www.geeksforgeeks.org/page-rank-algorithm-implementation/\n\nDescription: The PageRank transferred from a given page to the targets of its outbound links upon the next iteration is divided equally among all outbound links. If the only links in the system were from pages B, C, and D to A, each link would transfer 0.25 PageRank to A upon the next iteration, for a total of 0.75.\n\n4. Text link: Check Page Rank - Check Your PageRank Free!\n\nDomain: checkpagerank.net\n\nLink: https://checkpagerank.net/\n\n\n5. Text link: PageRank: Why Links Are So Important - Mediavine\n\nDomain: www.mediavine.com\n\nLink: https://www.mediavine.com/pagerank-why-links-are-so-important/\n\nDescription: PageRank is the original Google Search algorithm, written by Google co-founders Larry Page and Sergey Brin while at Stanford. To oversimplify its concept, PageRank uses links to evaluate the importance of pages and determine their ordering in search results.\n\n6. Text link: Google PageRank - Outbound Links - eFactory\n\nDomain: pr.efactory.de\n\nLink: http://pr.efactory.de/e-outbound-links.shtml\n\nDescription: Solving the equations gives us the following PageRank values for the first site: PR(A) = 14/23 PR(B) = 11/23. We therefore get an accumulated PageRank of 25/23 for the first site. The PageRank values of the second site are given by. PR(C) = 35/23 PR(D) = 32/23. So, the accumulated PageRank of the second site is 67/23.\n\n7. Text link: Google PageRank 10 Sites - PageRank 10 Websites Update ...\n\nDomain: www.searchenginegenie.com\n\nLink: https://www.searchenginegenie.com/pagerank-10-sites.htm\n\nDescription: A PageRank 10 website has the top most importance according to Google's system and every webmaster struggles to get backlink from these sites. Searchenginegenie strive to offer you the most updated information on PageRank sites, we monitor all the changes done by Google on regular basis.\n\n8. Text link: How To Calculate PageRank And What To Do With It\n\nDomain: www.shoutmeloud.com\n\nLink: https://www.shoutmeloud.com/how-to-calculate-pagerank-google-seo.html\n\nDescription: The PageRank of D equals the sum of the PR of the linking website(s) divided by their outgoing links. From this example, you see that links from pages with a high PR and less outgoing links are worth more than many links from low PR pages with thousands of outgoing links.\n\nLoad more (8)", "pred_label": "__label__1", "pred_score_pos": 0.9482156038284302} {"content": "What are Muscle Knots?\n\nWe often hear people saying they have a ‘knot’ in their muscle, but what is a  “knot” exactly? How do we get them and how do we get rid of them?\n\nMuscle “knots” are hard, sensitive areas of muscles that tighten and contract. They’re technical term is “A Trigger Point”. Some research suggests that these knots in the muscles may be patches of tissue polluted by metabolic waste. These tense muscle fibers are painful to touch and are mostly just annoying. However serious trigger points can transfer pain and strange sensations to other areas of the body. We call this “Myofascial Pain Syndrome”.\n\nMuscle knots can be caused by:\n\n • A sedentary lifestyle\n • Overusing or injuring your muscles\n • Poor posture\n • Dehydration\n • Unhealthy eating habits\n • Stress and anxiety\n\nMuscle knots can occur anywhere in the body, but they’re usually found in your back, shoulders, and neck. They often show up in your gluteal muscles, too.\n\nMuscle knots can cause aching sensations and pain in your muscles and joints. When you touch a muscle knot, it may feel swollen, tense, or bumpy. It could also feel tight and contracted, even when you’re trying to relax, and they’re often sensitive to the touch. The affected area may even become inflamed or swollen.\n\nMuscle knots can cause symptoms in areas outside of the muscles, including:\n\n • Headaches\n • Toothaches\n • Earaches\n • Pins and Needles\n\nYou may also experience stress, anxiety, and depression, and have difficulty sleeping.\n\n\nTreating muscle knots can take time. To get rid of the knots, you’ll need to break up the knotted tissue and calm inflamed nerves. The following are some things you can do to help release the knots and find relief.\n\nRest: Allow your body to rest if you have muscle knots. Take a break from any activities that are causing the knots, or that increase your pain or discomfort. Dedicate as much time as possible to relaxation. This may include sleeping longer than usual or lying in a comfortable position using pillows to support your body.\n\nStretch:  GENTLE stretching that elongates your muscles can help you to release tension in your body. Be gentle with yourself while stretching. Don’t force yourself into any positions or do anything that causes pain. For best results, hold stretches for at least 30 seconds, and release the stretch slowly to reduce your risk for injury\n\nExercise: Aerobic exercise may help to relieve muscle knots. If the knots are in your shoulders or neck, do arm swings, swimming and any other arm movements that work the muscles in your shoulders and neck. This stretches the muscles and increases their blood supply. Increased blood supply helps filters out toxins.\n\nHot and cold therapy: Using a combination of heat and cold can help to relieve pain and inflammation due to muscle knots. Cold helps to constrict the blood vessel, which reduces swelling. To apply cold, use a cold compress for 10 minutes, and then remove it for at least 15 minutes. You can repeat this until you begin to find relief. Heat relaxes and loosens stiff muscles, and relieves pain. Heat may increase blood flow, which promotes healing. To apply heat, use a heat pad or take a hot bath. Alternate between cold and heat treatment, or use the one that works best for you. Hot and cold therapy should be used in conjunction with other therapies such as remedial massage and trigger-point therapy.\n\nUse a muscle rub: Muscle rubs help to soften and relax muscle knots. You can massage a muscle rub onto the affected area twice a day for cooling relief. You may need someone to help you apply to it difficult-to-reach areas. Find a formula that contains menthol, capsaicin, or camphor. Before using a rub for the first time, do a patch test. To do a patch test, apply a small amount of the ointment onto the inside of your forearm. Wait 24 hours to make sure there’s no reaction. If there’s no reaction, you should be fine applying it to other parts of your body.\n\nTrigger Point Pressure Release: This therapy works by applying pressure to your trigger points. A skilled practitioner will put pressure on the muscle knot until it softens and releases. After a treatment session, you’ll have a set of movements to complete at home. This will help to retrain your muscles.\n\nRemedial Massage Therapy: In more persistent cases, remedial massage therapy is recommended. An experienced Remedial Massage Therapist or Myotherapist can help you identify the underlying causes of your muscle knots. They will treat your pain using treatments appropriate to your case. You will be taught techniques that will reduce pain and prevent it from recurring.\n\nReferral to a Physiotherapist: If your Remedial Therapist suspects a deeper underlying driver as the cause for your persistent muscle knots, they will consult our Physiotherapists at Inline Physio and derive the right course of management for you.\n\nPeter Thompson\n\nSLM Myotherapist and Remedial Massage Therapist\n\n\nDo you need help resolving your muscular issues?\n\nBook an appointment with one of our highly experienced massage therapists at Inline Physio Samford today!", "pred_label": "__label__1", "pred_score_pos": 0.5908721685409546} {"content": "Legal Alerts\n\n2020 Pennsylvania Labor & Employment Law Review\n\nPhiladelphia, Penn. (January 6, 2021) - With the conclusion of 2020, Pennsylvania employers should be aware of three significant employment law changes that took effect during the year.\n\n1. Modifications to Pennsylvania Overtime Regulations\n\nFor the first time in more than four decades, the Pennsylvania Department of Labor and Industry has modified the Commonwealth’s overtime regulations. These amendments, which became effective on October 3, 2020, raise the minimum salary threshold for overtime exemption. They also modify the definitions of executive, administrative, and professional employees to be more consistent with the Fair Labor Standards Act. Accordingly, employers should closely review these changes, which are described in detail below, and adjust their overtime policies and procedures as necessary.\n\nI.  Salary Threshold\n\nAs a reminder, Pennsylvania employers are not required to pay overtime to an employee who works in a bona-fide executive, administrative, or professional capacity, provided the employee’s salary meets the minimum salary threshold. Recent revisions to the overtime regulations create a phased-in increase to the salary threshold as follows:\n\n • October 3, 2020 - $684.00 per week or $35,568.00 annually;\n • October 3, 2021 - $780.00 per week or $40,560 annually;\n • October 3, 2022 - $875.00 per week or $45,500 annually.\n\nNotably, employers must keep in mind that the salary threshold is only one part of the analysis to determine if an employee may properly be classified as exempt from overtime pay requirements. In addition to meeting the salary threshold, an employee must also satisfy the “duties test” before the employee is properly classified as exempt. The duties test considers how employees actually spend their time at work, regardless of written job descriptions.\n\nII. Duties Test\n\n    A. Executive Capacity\n\n        Employment in a bona-fide executive capacity means work by an individual:\n\n 1. Whose primary duty is the management of the enterprise in which he or she is employed, or of a customarily recognized department or subdivision;\n 2. Who customarily and regularly directs the work of two or more employees;\n 3. Who has the authority to hire or fire employees, or whose suggestions or recommendations as to the hiring, firing, advancement, promotion, or other change of status of employees are given particular weight.\n\n    B. Administrative Capacity\n\n        Employment in a bona-fide administrative capacity means work by an individual:\n\n 1. Whose primary duty is the performance of office or nonmanual work directly related to management or general business operations of the employer or the customers of the employer;\n 2. Whose primary duty includes the exercise of discretion and independent judgment with respect to matters of significance.\n\n    C. Professional Capacity\n\n        Employment in a bona-fide professional capacity means work by an individual:\n\n 1.  Whose primary duty is the performance of work requiring either of the following:\n\n- Knowledge of an advanced type in a field of science or learning customarily acquired by a prolonged course of specialized instruction and study;\n- Invention, imagination, originality, or talent in a recognized field or artistic or creative endeavor.\n\nIn light of the recent revisions to Pennsylvania’s Minimum Wage Act, employers should review not only employee pay, but also job descriptions and the actual work performed by employees notwithstanding their written job descriptions. By analyzing the actual work performed by employees, employers may ensure compliance with state and federal overtime laws.\n\n2. Philadelphia Wage Equity Ordinance\n\nThe Philadelphia Wage Equity Ordinance, which was passed in an attempt to narrow the gender wage gap, is now in effect. The Philadelphia City Council determined that as a result of women receiving lower wages than men on average, an employer’s decision to base wages on an applicant’s wage at a previous job perpetuates the gender wage gap. As such, salary offers should be based on the responsibilities of the position and not on the applicant’s prior wages. As a result, it is an unlawful employment practice for an employer, employment agency, or an employee or agent to:\n\n 2. Retaliate against a prospective employee for failing to comply with any wage history inquiry or for opposing an act made unlawful by the Wage Equity Ordinance; and\n 3. Rely on the wage history of a prospective employee from any current or former employer of the individual in determining the individual’s wages at any stage in the employment process, including the negotiation or drafting of an employment contract, unless the applicant knowingly and willingly disclosed his or her wage history to the employer, employment agency, employee, or agent.\n\nHowever, the prohibition against relying on wage history does not apply to actions taken by an employer pursuant to any federal, state, or local law that specifically authorizes the disclosure or verification of wage history for employment purposes.\n\nAn inquiry concerning wage history includes a written request or a request during an interview. Additionally, employers should be aware that the Ordinance defines “wages” to include all earnings of an employee, including fringe benefits, wage supplements, or other compensation, whether it is payable by the employer from the employer’s funds or from amounts withheld from the employee’s pay by the employer. As a result, employers should remove any questions concerning salary history as well as benefits information from employment applications and from any other forms used during the hiring process.\n\nEmployers should also train human resources personnel, recruiters, managers, and any other personnel who might be involved in the hiring process, on the requirements of the Wage Equity Ordinance.\n\n3. Amendment of the Philadelphia Fair Practices Ordinance to Protect Characteristics Commonly Associated with Race, Including Hairstyles, from Discrimination\n\nOn November 10, 2020, Philadelphia Mayor Jim Kenney signed legislation amending the Philadelphia Fair Practices Ordinance to include discrimination based on characteristics commonly associated with race, including hairstyles, as discrimination on the basis of race. The ordinance defines “hairstyles” to include, among other things, hair texture and styles such braids, cornrows, locs, Bantu knots, Afros, and twists, regardless of whether hair extensions are used to create the style and regardless of whether the hair is adorned by hair ornaments, such as ribbon, headwraps, beads, or barrettes.\n\nFor more information on the laws referenced herein, contact the author or editor of this alert, or visit our Labor & Employment Practice page to find an attorney in your area.\n\n\nJohn M. Borelli, Associate\n\n\nThalia S. Rofos, Partner\n\nRelated Practices\n\nRelated Attorneys\n\nFind an Attorney\n", "pred_label": "__label__1", "pred_score_pos": 0.9261935353279114} {"content": "[Conspiracy: Take the Crown ]\n\nRegular price $0.23 1 in stock\nAdd to Cart\nNon Foil\n\n Set: Conspiracy: Take the Crown\n Type: Instant\n Cost: {B}\n Reveal Regicide as you draft it. The player to your right chooses a color, you choose another color, then the player to your left chooses a third color. Destroy target creature that's one or more of the colors chosen as you drafted cards named Regicide.\n\n \"You're done!\"\n\n Non Foil Prices\n\n Near Mint - $0.24\n Lightly Played - $0.23\n Moderately Played - $0.19\n Heavily Played - $0.14\n Damaged - $0.12\n\n Foil Prices\n\n Near Mint Foil - $1.00\n Lightly Played Foil - $0.90\n Moderately Played Foil - $0.80\n Heavily Played Foil - $0.60\n Damaged Foil - $0.50\n\nBuy a Deck", "pred_label": "__label__1", "pred_score_pos": 0.9996505379676819} {"content": "Girls Winter Basketball\n\n\nOn any team, it is incredibly important to have close relationships with your teammates. For the Newport Harbor’s Girl’s Varsity basketball team, their closeness helped them achieve their goals. By being such a close team, the girls were able to celebrate their many victories and move on and learn from their losses. On and off the court, these girl’s friendship with each other impacted the program.\n\nDuring season, the girls’ closeness with each other helped them acquire eight wins in league. They achieved this awesome feat through a combination of mad skill, speed, and communication. As well as all this, forming solid friendships with each other helps keep the energy and excitement up during a game, and positive thinking can make a difference in the resulting score. Sophomore Hannah Hiromoto says, “being friends with everyone helps because you can always be there for each other.” Supporting each other throughout the season helped them play better on the court because knowing that your teammate has your back allows you to focus in the moment in the game that matters.\nFor the second year, the girls’ varsity team has been able so have an athletic set of sisters, sophomore Alexia and senior Angelina Alvarez, whose bond as siblings helps the team on the court. “The whole team has a good connection,” says Hiromoto, but “it’s the bond that they already have as sisters that makes it even better.” For many people, being on a team is like being a part of a second family, but for these sisters, playing together is just another opportunity to bond with each other while playing the sport that they love. At the senior night game on February 6th, Alexia Alvarez had an open court and the perfect opportunity for a layup, however she passed the ball back to her sister who was running up behind her so she had the opportunity to make the shot in one of her last games at Harbor. In the end, the girls won that game against Fountain Valley 40-34 because of their teamwork!\nThe team’s wins are examples of how although there is a pair of sisters on the team, every player is family with each other, and they want to help each other enjoy the game while getting better. As a team, but equally importantly as friends, the girls grew close together and had a fun season and the non-seniors can’t wait for next year.\nWritten By: Delaney Knipp", "pred_label": "__label__1", "pred_score_pos": 0.7423362135887146} {"content": "Hot Student Stories\n\nWhat caused conflict among some members of the Republican party?\n\nTimothy Norman\n\nin Social studies\n\n1 answer\n\n1 answer\n\nRamon Kelly on September 20, 2018\n\nThe issue of slavery was a huge underlying problem to the formation of the Republican party.May 20, 1854, a group of politically-minded former Whigs met in Ripon , Wisconsin, to discuss the possibility of forming a new political party that will focus on the prevention of the spread of slavery in the Western territories. The idea took off, and on the 6th of June, 1854, more than 10,000 people gathered in Jackson, Michigan to establish the new party and therefore the Republican party was born.\n\nAdd you answer", "pred_label": "__label__1", "pred_score_pos": 0.9100577235221863} {"content": "Playing the devil’s advocate\n\n\nRowan County, Kentucky clerk Kim Davis, has become the poster child for the growing cultural divide in this country. Sentenced to jail time for not issuing paperwork for same-sex marriage applications, Davis has been vilified by her opponents and championed by her supporters.\n\nEarlier this summer, the US Supreme Court ruled 5-4 in the Obergefell v. Hodges case, that same-sex marriages must be allowed by all states. Chief Justice John Roberts dissented and predicted that conflicts in “religious liberty” would follow.\n\nMuch discussion goes on about the ability of the courts to “legislate from the bench,” creating laws. It may sound like parsing words, but interpreting a law can be a matter of changing it. The ruling in favor of same-sex marriages was in part based on an interpretation of the 14th Amendment. Those who like the outcome of a court decision don’t consider it legislation, those that disagree, tend to see it as law-making, a power the courts are not suppose to have.", "pred_label": "__label__1", "pred_score_pos": 0.686390221118927} {"content": "Think Globally, Practice Locally: A Community Outreach Strategy\n\ncommunity outreach In September, TPC presented a session at the IAP2 Annual conference in Montreal to explore key issues facing the future of public participation. When everyone is connected to everyone else and opinions can be posted to the world from your phone, does anyone really care about coming together to talk about issues anymore? Do those in power really have any interest in sharing their power? Does the public truly think that they have any true voice in governance? How has the polarization of society and the deterioration of political behavior changed how we work together as communities? We sought to understand these questions from the perspective of the government agencies and consultants who conduct public participation through community outreach in a short survey looking at how the practice has changed over the past decade.\n\nIn all, we heard from 233 of our peers and we found the results more heartening than we expected. While a modest number of people, our respondents were widely representative of the agencies that engage the public, with even distribution among federal, state, and local agencies.\n\nRather than describing a diminished role and importance of public participation in the face of many social, political, and technological shifts, respondents noted that agencies who used public participation in the past, continue to work hard to use and promote public input in the important work of governing. While we are not blind to the challenges, this also aligns with our own community outreach experience at The Participation Company.\n\n98.5 % of respondents to our poll agreed that public input should play an important role in decision-making and 90% say that the input they receive from the public improves their decision-making. Additionally, 75% of the respondents believed that there is more participation going on today than a decade ago, 65% said the quality of participation has improved, and 79% said that agencies are more inclined to engage citizens than before.\n\nThis does not mean that all is well; folks also noted the increase in social media trolling and political lobbying, and a decrease in civility. In fact, 79% cited polarization and public anger and 76% cited political interference as key obstacles to good participation.\n\nSo what does it all mean? We think the most important takeaway is that even when the world seems to be a place where nobody can agree or get along, the basic power of participation is still available to us and perhaps more important than ever. When we engage people during community outreach endeavors in good process, provide them with good information, and treat them with respect, we can still make meaningful, sustainable, and implementable decisions for our communities.\n\n\nAuthor: Doug Sarno", "pred_label": "__label__1", "pred_score_pos": 0.8539618849754333} {"content": "Does An LLC End When The Owner Dies?\n\nWhat happens when business owner dies?\n\nIf the business is a sole proprietorship, it will terminate upon the owner’s death and its assets will become part of the owner’s estate.\n\nIf the business is a corporation, limited liability company, or other business entity, it will continue to exist and will maintain ownership of all business assets..\n\nCan a partnership continue after death?\n\nMost legislation states that the partnership will end upon the death or bankruptcy of any partner. If your partner dies, you will then owe your partner’s estate their share of the partnership that accrues at the date of their death.\n\nIs a trust better than an LLC?\n\nThe answer is that the LLC is designed to protect your personal assets from lawsuits, while the Living Trust preserves your estate from probate costs and inheritance taxes when you die, and prevents court control of your assets if you become incapacitated.\n\nShould rental property be in an LLC or trust?\n\nYour rental property should be owned in an LLC. Rental properties generate income and wealth but they can also create liabilities. … An LLC owned by one person or a married couple isn’t too difficult to manage and generally doesn’t require a separate LLC tax return.\n\nHow do I form a family LLC?\n\nA family LLC is formed by one family member who serves as the managing member. The family LLC’s operating agreement defines and restricts rights related to ownership, functional decision making, and transfer of assets.\n\nCan an LLC have beneficiaries?\n\nNaming in a Will If an LLC operating agreement does not allow you to transfer your ownership interest, an alternative option is to name a beneficiary in your will. The remaining LLC members will have the option of buying that interest if the beneficiary wants to sell it.\n\nHow do you transfer a company after death?\n\nThe successor or legal heir has to first submit the death certificate of the sole proprietor and the succession certificate to the jurisdictional proper officer as documentary evidence. The proper officer will then add the successor as the authorised signatory for the deceased sole proprietor.\n\nCan you inherit a sole proprietorship?\n\nThe law says a sole proprietorship does not survive you. This means the company cannot keep operating under its original name, and the company cannot be inherited.\n\nCan my LLC buy my house?\n\nPer the laws of most states, an LLC ownership interest is considered property of the owner. Like most other property of its owner, it can be seized to pay off creditors. … So, in short, if you own your LLC and your LLC owns your home, your creditor might simply take your LLC to get at your home.\n\nCan I add a beneficiary to my business account?\n\nA legal way to get business funds to your beneficiary quickly is to deposit them in a payable-on-death account. Being a sole proprietor doesn’t affect the POD option, as the money is still your personal cash. Fill out a form at your bank naming your account beneficiary.\n\nWhat is a family LLC estate planning?\n\nA limited liability company (LLC) can be a useful legal structure through which to pass assets down to your loved ones while avoiding or minimizing estate and gift taxes. A family LLC allows your heirs to become shareholders who can then benefit from the assets held by the LLC, while you retain management control.\n\nCan you inherit an LLC?\n\nUnder the RULLCA, a member of an LLC can transfer an interest toanother. One way to do this is by bequeathing it after death. What can be transferred is limited. A member can only transfer his financial interests in the business or the ability to claim any distributions from the business.\n\nHow can an LLC pay less taxes?\n\nThe IRS treats one-member LLCs as sole proprietorships for tax purposes. This means that the LLC itself does not pay taxes and does not have to file a return with the IRS. As the sole owner of your LLC, you must report all profits (or losses) of the LLC on Schedule C and submit it with your 1040 tax return.\n\nWhat happens to an LLC when the owner dies?\n\nWhat happens to a Single Member LLC, once the member of the LLC dies? An LLC can survive beyond the death of its owner. … Even if the LLC is not mentioned in the will, the next of kin will automatically inherit the deceased’s member ownership interest unless the operating agreement prohibits it.\n\nDoes an LLC go through probate?\n\nLimited Liability Company (LLC) The LLC is a business organization that can own property and assets. Using a Trust or Family Limited Partnership, shares of the LLC can be owned and transferred without Probate Court involvement. … When properly organized, the LLC can be structured to avoid Probate Proceedings.\n\nCan an LLC change owners?\n\nMembers of an LLC may change the LLC’s ownership and the terms governing its management and operation by amending its operating agreement. … Once LLC members amend the operating agreement and the new ownership and management terms are reflected in it, there are some necessary follow-up actions.\n\nDoes having an LLC help with taxes?\n\n\nShould my spouse be a member of my LLC?\n", "pred_label": "__label__1", "pred_score_pos": 0.9610151052474976} {"content": "COVID-19 Neighborhood Profiles\n\nAlthough COVID-19 is an issue affecting people around the United States and the globe, its impact differs widely across local communities and neighborhoods. Air quality, population density, and access to resources like hospitals and testing centers are just a few of the factors that impact the severity of cases and deaths in a community. Additionally, the pandemic has had wide reaching impacts on important factors outside of health like employment, housing, food access, and education. \nThese neighborhood profiles highlight the intersections of COVID-19 and other social and economic indicators in specific neighborhoods throughout Los Angeles County. They are a feature of the NDSC COVID-19 Dashboard\n\nEast Los Angeles & the Digital Divide\n\nAs schools closed under the “Safer at Home” order in the Spring of 2020, students were forced to resume their schooling remotely online. However, computer and/or internet access differs widely across communities in LA County.\nEast Los Angeles is an unincorporated neighborhood in the Eastside region of Los Angeles County. As of June 31, 2020 East LA had the third highest cases of COVID-19 (2507) and 7th highest deaths (59) in the LA County.  Although over 26% of East LA's total population (117,348) is under the age of 18, over 22% of households in the neighborhood have no access to a computer – more than double the county average of 10%. Similarly, 36% of households in East LA do not have access to internet in their homes compared to the county average of 18%. The challenges presented by lack of internet and computer access for East LA families during COVID school closures are likely further complicated by the fact that nearly 25% of the households in the neighborhood have limited English proficiency. \nThe chart to the right shows computer/internet access and English proficiency for East LA and LA County. Select your neighborhood from the menu to add it to the chart. \nThe impact of school closures on student proficiency and educational attainment is yet to be determined. However, amid uncertainty as to when schools will reopen, school districts must address the digital divide in certain communities in order to ensure continued, quality education for vulnerable students who may face challenges to learning at home. \n\nFood Services Jobs in Pico-Union\n\nAccording to a recent Pew Research report, workers in industries including restaurants and bars, hotels, and retail trade services are at a higher risk of virus-related layoffs due to countywide closures of many businesses. This is exasperated by the fact that Los Angeles is home to 26% of the state’s accommodation and food service jobs and 8.3% of all hospitality jobs. Young workers make up 24% of employment in these industries nationwide and will therefore be disproportionately affected by COVID-19 layoffs.  A recent spike in COVID-19 cases and deaths in LA County has halted reopening plans and have put an additional economic strain on already struggling businesses.\nPico-Union is a neighborhood in the City of Los Angeles. As of July 27th, Pico-Union ranked in the top 10 neighborhoods for total deaths due to COVID-19, with a death rate of 185 per 100,000 persons. Additionally, while only 6% of LA County’s workforce is employed in the accommodation and food services industry, 17% of Pico-Union’s employed population works in this industry. Further, over 10% of Pico Union’s population are between the ages of 18 and 24. Prior to the onset of the pandemic and subsequent economic crisis, Pico-Union had a higher rate of unemployment (8.5%) compared to the rest of the county (6.8%). Given the uncertainty surrounding the reopening of the county, it is likely that residents of Pico-Union will suffer a disproportionate economic impact due to the prevalence of accommodation and food service jobs in the neighborhood.\nHover over the circles on the chart below to see the percent of workers employed in the accommodation & food services industry, the percent of the population that is ages 18 to 24, and the unemployment rate in a specific neighborhood. \n\nYoung workers likely to be hard hit as COVID-19 strikes a blow to restaurants and other service sector jobs. Pew Research CenterLink\n\nCOVID-19 cuts deep into LA jobs: Hospitality, entertainment sectors drive unemployment results. Los Angeles Business JournalLink\n\nWestlake & Housing Vulnerability\n\nMany of Los Angeles’ majority renter population were feeling the pressure of the region’s housing crisis, which has been fueled by rising rents and stagnant wages, well before the pandemic. However, the economic and health fallout from the pandemic and subsequent shutdown are expected to put additional pressure on many of the county’s renters.\nAs of July 23, 2020, Westlake, a neighborhood just west of Downtown LA, had the highest COVID-19 cases (2,865) and the highest COVID-19 related deaths (143) of any neighborhood in the City of Los Angeles. Westlake also has some of the most cramped living conditions in the country. 38% of households are considered to be living in overcrowded housing, with more than one person per one room, compared to an average of 11% across the county. Overcrowded housing has been found to correlate with higher infections rates per capita and can put residents at greater risk of contracting the virus. Additionally, overcrowding is a result of the city’s housing crisis that has more and more families doubling up, living with relatives etc. Over 95% of households in Westlake rent (rather than own) their housing, and 59% of renters in the neighborhood are considered to be rent-burdened, meaning that they pay more than a third of their income on rent.\nThe map to the left shows overcrowding rates in Westlake and 9 other neighborhoods experiencing some of the highest COVID-19 case rates. Select your neighborhood from the menu to add it to the map. \n59% of the population in Westlake are immigrants, 73% of which are non-citizens, meaning that many of these residents have been left out of unemployment benefits and COVID-related relief programs. The economic impacts of COVID-19 may place many residents of the neighborhood in imminent danger of eviction once certain protections such as the County’s moratorium on evictions, which has been extended through September, are lifted.\nCOVID-19 Cases in New York City, a Neighborhood-Level Analysis. NYU Furman Center. Link.", "pred_label": "__label__1", "pred_score_pos": 0.999973714351654} {"content": "@article{Dr. Manoj C. Shastri_2011, title={The Impact of Yoga on Anxiety of Secondary School Students}, volume={1}, url={https://www.bricsjer.com/index.php/brics/article/view/17}, abstractNote={

The present study was conducted with the objective of studying & investigating the Impact of Yoga on Anxiety of Secondary School Students. Anxiety is a source of stress among adolescents and yogic practices helps to reduce academic anxiety. So, the investigator focused on the present study exploring the effect of yogic practices on anxiety of secondary school children. The study would not only add to the body of knowledge related to importance of yoga, but also provide a great help to psychologists, educationists, principals, parents and counselors for effective handling of the adolescents. The investigator has discussed in depth about the analysis and interpretation of the collected data during pre-test and post-test in the present study.

}, number={2}, journal={BRICS JOURNAL OF EDUCATIONAL RESEARCH}, author={Dr. Manoj C. Shastri}, year={2011}, month={Apr.}, pages={119-126} }", "pred_label": "__label__1", "pred_score_pos": 0.9996870756149292} {"content": "Adventures in Film: Nostos, Little Grasses, Checkmate\n\nTasha Chu, Anjali Mehra, Monique Jonas\nNew Adventures / Tea Films\n\nGo to stream...\n\nAdventures in Film choreographers\n\nIn a year that has starved emerging artists of oxygen to air new work, it’s heartening to experience Matthew Bourne’s Adventures in Film series as a response to the pandemic, even if creative results are still experimental in terms of using digital film as narrative dance art.\n\nThe dance theatre company was quick off the mark to respond to theatre closures by releasing three short films from three female choreographers who use inventive movement patterns enhanced by film techniques to impart stories that may otherwise not have seen the light of day.\n\nNostos, the first to be aired consecutively over three weeks, is a seven-minute short featuring a couple exploring conflict and it’s aftermath. Choreographed by Tashu Chu, the piece investigates a relationship between a female army recruit and her partner that appears to be falling apart at the seams.\n\nBacked by a rousing score from Chelsea McGough, the couple are transported to a warehouse where dancers Seren Williams and Mark Samaras perform solo pieces that wind and weave in and out of duets and around war-battered architecture supporting their conflict. Williams draws on contemporary dance while Samaras is more balletic, framed and set beautifully against the mysterious odd building playing on light and dark, windows, shadows and space.\n\nIt’s a strange film, but oddly compelling as movement compassionately communicates grief, love and loss, wrapped around a decaying relationship, even if it’s sometimes unclear where the narrative flow is leading the viewer.\n\nAnjali Mehra’s Little Grasses Crack Through Stone, available from November 27, draws inspiration from a Sylvia Plath radio play. The eight-minute film shifts between black and white film-noiresque mystery to bursts of colour, memorably red, exploring themes of pregnancy, reproduction and miscarriage. Three dancers—Charlie Broom, Cordelia Braithwaite and Estela Merlos—lie on the floor with heads drawn close together. Viewers look down upon the trio from an arial view, as they create circular gestures with arms and hands forming a human kaleidoscope.\n\nThe camera pans close up to the dancers’ hands, faces, introducing rubbing gestures and lots of gesticulating as metaphors for distress that eventually move down the body to focus on the stomach. Stomachs are a feature of all choreographic intention throughout the rest of the film.\n\nThen there are surreal set-ups from fully clad bath shots to beautiful white rooms overlooking picture windows with swaying trees, while two masked dancers sit in the corner watching a baby being rocked. Such rich visual language makes it hard at times to focus on the purity and beauty of movement-making, detracting from, rather than enhancing, the choreography.\n\nThe final dance film, Checkmate, to be released on December 4, is choreographed by Monique Jonas and entitled \"Two paths… one truth one man’s journey into the shadows\" and features a dancer chased down by a headless, black-clad figure, resembling a still from Return of the Living Dead.\n\nJonas’s work is set in a nebulous industrial space with the paint peeling and an air of foreboding rippling through the empty corridors of the mirrored spaces. Dancers Rhys Dennis and Ihsaan De Banya perform convincingly, twisting, writhing and gyrating through complex movement sequences. Jonas creates the impression of limbs contorting, contracting and controlled by a greater force. Perhaps the headless chess piece that drags around shrouded in black tormenting the other is a step too far in terms of creating a believable cinematic scenario, but as dance theatre, it’s beautiful and spooky to watch the body’s capability of metamorphosis.\n\nReviewer: Rachel Nouchi", "pred_label": "__label__1", "pred_score_pos": 0.9923409819602966} {"content": "Combine Chiropractic and Medical Care to Treat Whiplash\n\nMay 2, 2020\n\nWhen you have whiplash, it’s imperative that you start treating your symptoms with medical and chiropractic care in Naples, FL. The faster you start addressing the injury, the more likely it is that you’ll be able to reduce long-term effects. Even if you feel fine after a car accident or other high-velocity impact, your spine and muscles might not show symptoms until days or weeks later. Don’t risk subjecting yourself to a lifetime of neck pain—seek help immediately.\n\nLong term effects of whiplash\n\nWhiplash occurs when the head and neck are thrown forward, back and then forward again at a high speed. This causes your muscles to enter forward flexion, hyperextension and finally hyperflexion, which strains the spine and causes it to form an “S” shape. Whiplash is often caused by car accidents, but any impact while your body stays in one place as your head and neck are violently thrown forward can have the same effect.\n\nWhiplash symptoms commonly develop hours or days after an accident, but in some cases, they may not be evident for weeks, months or even years. If you fail to address the symptoms, you could be in for a long, painful road to rehabilitation—since the muscles in our necks and spines move so frequently, any damage can cause lasting and often excruciating pain. You’re likely to experience neck and shoulder pain, stiffness, jaw pain, fatigue and headaches.\n\nCombining medical and chiropractic care\n\nSeeking chiropractic and medical treatment for your injuries is the best way to prevent further damage. Your medical doctor may prescribe ice, painkillers and a cervical collar to help keep your neck and spine in place while your injuries heal. In rare cases, surgery may be needed.\n\nChiropractors offer complementary, holistic treatments, including manual adjustments, massage, exercises and lifestyle change recommendations to help ensure the best treatment possible. Spinal adjustments help encourage the muscles to return to their normal positions, which decreases pressure on the nerves and prevents them from getting used to a strained or otherwise improper position. In turn, the ligaments and tendons will follow suit, relieving strain. Your chiropractor will work with you to examine your injuries and address the root cause, which should reduce your whiplash symptoms. Overall, treatment can take between a few days and a few months, depending on the severity of your injuries and how long they were left untreated.\n\nIf left untreated, whiplash injuries can significantly worsen. You may experience chronic pain, inflammation, insomnia, fatigue, stress and anxiety as a direct result of your injuries. Some patients may experience joint damage for the first time, or notice that existing damage has worsened.\n\nWhenever you’re in an accident, it’s wise to seek both traditional medical and chiropractic care immediately. Are you interested in finding out how medical and chiropractic care can treat whiplash in Naples, FL? Hiler Chiropractic & Neurology can help. Reach out to us today to schedule an appointment for your whiplash symptoms, no matter how long it’s been since the accident.\n\nCategorised in: ,\n\nHiler Chiropractic & Neurology", "pred_label": "__label__1", "pred_score_pos": 0.9783905744552612} {"content": "Maximum efforts to reduce IND backlog will continue this year\n\nAs of 31 December 2020, the task force had closed around 8,200 requests for asylum from the accumulated work of the Immigration and Naturalisation Service (IND). This according to a letter from Minister for Migration Broekers-Knol, which was presented to the House of Representatives on Thursday. In the coming months, the task force will need to process some 7,000 remaining applications. The task force was established last March for the purpose of helping the IND work through its backlog of over 15,000 applications. In 2021, like last year, IND and the task force will make every effort to eliminate the IND backlog and to render a decision on asylum applications within the statutory term.\n\nMinister for Migration Broekers-Knol:\n\n“The goal was to provide every applicant with a clear answer before the end of 2020. While we have succeeded in part, there are unfortunately still many people who are awaiting clarity. We are doing everything in our power to notify those people of a decision as quickly as possible, so that they can get on with their lives.” \n\nProgress and new applications for asylum\n\nThe task force was created in order to complete the processing of asylum applications submitted prior to 1 April 2020 as quickly as possible, while paying due regard to the criteria of diligence and care, security and feasibility. An update on the task force's progress is published on the IND website each month.\n\nIn the period between 1 April and 31 December 2020, the IND received 9,200 new asylum applications and 1,170 repeat applications. The IND's goal is to process new applications for asylum as quickly and carefully as possible within the statutory term. To date, a decision has been rendered on forty-five per cent of those applications. In twenty cases, that decision was taken outside the statutory term because the file was connected to applications from the task force backlog. This pertains, for example, to applications for newborn babies whose parents had previously submitted applications for asylum which are being processed by the task force.", "pred_label": "__label__1", "pred_score_pos": 0.9998611807823181} {"content": "What is the classification of garden tools?\n\n\nGarden tools are actually quite general, and they are m […]\n\nGarden tools are actually quite general, and they are mainly divided into two categories. Next, the editor will briefly introduce the types of garden tools. Let’s take a look:\n1. Gardening tools include garden scissors, flower tools (garden flower tools, small flower sets), etc.\nThe main products of garden shears include high branch shears, hedge shears (hedge shears), pruning shears (pruning shears, pruning shears), multi-purpose shears, fruit picking shears, flower shears, grass shears, etc.; garden set of flower tools (garden Flower tools, small sets of flower tools) including flower shovel, flower shovel, flower rake, flower hoe, flower fork, etc., specifically there are two hoe (two flower hoe), flat hoe, flat rake, three-tooth flower hoe, three-tooth flower Rake, hoe rake, hoe pick, large flower shovel, small flower shovel, three-shaped flower shovel, flat flower fork, six-tooth flower rakes, etc.\n2. Garden machinery mainly includes: lawn trimmers, brush cutters, hedge trimmers, chainsaws, water pumps, punchers, drafting machines, sprayers and various garden tools.\nWith the development of urban construction in China over the past few years, urban greening has formed a large industry, and daily maintenance depends on these tools. Most of the garden tools powered by gasoline engines, such as lawn mowers, pruning shears, lawn mowers, trimmers, brush cutters, etc., are commonly seen daily. Household tools are not common in the domestic market. Although most of them are produced in China, they are basically sold to the European and American markets.\nThe above is the relevant knowledge introduction we have compiled for you. If you want to know more, please contact us in time. We take the customer as the center, focus on product quality, provide you with high-quality products, continue to introduce new products, expand a wider range, strive for perfection, and develop together to open up the future!", "pred_label": "__label__1", "pred_score_pos": 0.9392181038856506} {"content": "Turning away from Afghanistan will have “catastrophic consequences”, warns the UN refugee chief\n\nThe international community must continue to help Afghanistan or face the risk of “catastrophic consequences”, UN High Commissioner for Refugees Filippo Grandi called ahead of a donors’ conference starting on Monday.\n\nGrandi also appeals after his visit to the Asian nation struggling with growing violence, an American challenge and the flagging of peace talks.\n\nGrandi said the future of millions of Afghans depends on the outcome of the peace talks and on the international community’s commitment to developing the country, including at the two-day donors’ conference in Geneva.\n\n“Failure on either side would cause Afghanistan to slide backwards with catastrophic consequences, including possible further large-scale relocation,” Grandi warned in a statement.\n\nHe said the nearly 300,000 Afghans displaced within the country this year due to conflict are still in “urgent need” of humanitarian aid.\n\nThe same applies to the almost three million previously displaced and the nine million people who have lost their livelihoods due to the Covid-19 crisis.\n\nGrandi also said it was urgent to conclude peace talks between the Afghan government and the Taliban, who are fighting to overthrow it and regain the power they lost during the US-led invasion of Afghanistan in 2001.\n\nThe peace talks are flagged and a withdrawal of some of the US forces announced by the Trump administration this week further weakens the Kabul government.", "pred_label": "__label__1", "pred_score_pos": 0.9991080164909363} {"content": "1/56 Panther Ausf G\n\nRegular price $42.00\n\nTax included.\n\n\nPanther (designated as Sd.Kfz. 171) is the common name of a medium tank deployed by Nazi Germany in World War II from mid-1943 to the end of the European war in 1945.  It was intended as a counter to the Soviet T-34, and as a replacement for the Panzer III and Panzer IV.  While never replacing the latter, it served alongside it and the heavier Tiger tanks until the end of the war.  The Panther’s excellent combination of firepower, mobility, and protection served as a benchmark for other nations’ late war and post-war tank designs, and it is regarded as one of the best tanks of World War II.\n\n\nThe Panther tank was a compromise of various requirements.  While having essentially the same engine as the Tiger I tank, it had better frontal armor (including the benefit of a sloped armor, increasing effective armor depth), better gun penetration, was lighter and thus faster, and could traverse rough terrain better than the Tigers.  The tradeoff was weaker side armor.  The Panther proved to be deadly in open country and long range engagements, but vulnerable in close-quarters combat.  Over 6,000 Panther tanks were produced between January 1943 and April 1945.\n\n\nThis model kit depicts the late version of the Panther tank.  About 3,000 were produced between March 1944 and April 1945.  With this kit, you can assemble a Panther Ausf G with optional air cooler and rear exhaust choices, with or without side armour.\n\nProduct Code: 280015\nNumber of Parts: 53 pieces / 3 sprues", "pred_label": "__label__1", "pred_score_pos": 0.7264590263366699} {"content": "Earth-Sized, Habitable Zone Planet Found Hidden in Early NASA Kepler Data\n\nComparison of Earth and Kepler-1649c\n\nA comparison of Earth and Kepler-1649c, an exoplanet only 1.06 times Earth’s radius. Credit: NASA/Ames Research Center/Daniel Rutter.\n\nA team of transatlantic scientists, using reanalyzed data from NASA’s Kepler space telescope, has discovered an Earth-sized exoplanet orbiting in its star’s habitable zone, the area around a star where a rocky planet could support liquid water.\n\nScientists discovered this planet, called Kepler-1649c, when looking through old observations from Kepler, which the agency retired in 2018. While previous searches with a computer algorithm misidentified it, researchers reviewing Kepler data took a second look at the signature and recognized it as a planet. Out of all the exoplanets found by Kepler, this distant world — located 300 light-years from Earth — is most similar to Earth in size and estimated temperature.\n\nThis newly revealed world is only 1.06 times larger than our own planet. Also, the amount of starlight it receives from its host star is 75% of the amount of light Earth receives from our Sun — meaning the exoplanet’s temperature may be similar to our planet’s as well. But unlike Earth, it orbits a red dwarf. Although none has been observed in this system, this type of star is known for stellar flare-ups that may make a planet’s environment challenging for any potential life.\n\n\n\n\n“Out of all the mislabeled planets we’ve recovered, this one’s particularly exciting — not just because it’s in the habitable zone and Earth-size, but because of how it might interact with this neighboring planet,” said Andrew Vanderburg, a researcher at the University of Texas at Austin and first author on the paper released in The Astrophysical Journal Letters. “If we hadn’t looked over the algorithm’s work by hand, we would have missed it.”\n\n\nPreviously, scientists on the Kepler mission developed an algorithm called Robovetter to help sort through the massive amounts of data produced by the Kepler spacecraft. Kepler searched for planets using the transit method, staring at stars, and looking for dips in brightness as planets passed in front of their host stars.\n\nMost of the time, those dips come from phenomena other than planets — ranging from natural changes in a star’s brightness to other cosmic objects passing by — making it look like a planet is there when it’s not. Robovetter’s job was to distinguish the 12% of dips that were real planets. Those signatures Robovetter determined to be from other sources were labeled “false positives,” the term for a test result mistakenly classified as positive.\n\nWith an enormous number of tricky signals, astronomers knew the algorithm would make mistakes and would need to be double-checked — a perfect job for the Kepler False Positive Working Group. That team reviews Robovetter’s work, going through all false positives to ensure they are truly errors and not exoplanets, ensuring fewer potential discoveries are overlooked. As it turns out, Robovetter had mislabeled Kepler-1649c.\n\nEven as scientists work to further automate analysis processes to get the most science as possible out of any given dataset, this discovery shows the value of double-checking automated work. Even six years after Kepler stopped collecting data from the original Kepler field — a patch of sky it stared at from 2009 to 2013, before going on to study many more regions — this rigorous analysis uncovered one of the most unique Earth analogs yet discovered.\n\n\nNearly perfect period ratios are often caused by a phenomenon called orbital resonance, but a nine to four ratio (9:4) is relatively unique among planetary systems. Usually resonances take the form of ratios such as 2:1 or 3:2. Although unconfirmed, the rarity of this ratio could hint at the presence of a middle planet with which both the inner and outer planets revolve in synchronicity, creating a pair of 3:2 resonances.\n\n\nEither way, this system provides yet another example of an Earth-sized planet in the habitable zone of a red dwarf star. These small and dim stars require planets to orbit extremely close to be within that zone — not too warm and not too cold — for life as we know it to potentially exist. Although this single example is only one among many, there is increasing evidence that such planets are common around red dwarfs.\n\n\nFor more information about Kepler and its discoveries, visit", "pred_label": "__label__1", "pred_score_pos": 0.9997485280036926} {"content": "Interacting with Environments\n\nExperiential Graphic Design\n\nExperiential Graphic Design (EGD) is the marriage of graphic design, architecture, and interior design which combines typography, color, and form. It plays a critical role in how we experience, understand, navigate, and interact with our environment.\n\nThe purpose of EGD is to provide something unique and meaningful to the user, whether it’s creating an experience, celebrating a brand, communicating information, or providing instruction on how to navigate the space.\n\nRead more…", "pred_label": "__label__1", "pred_score_pos": 0.9959625601768494} {"content": "Geopolitics Trumps the Markets\n\nAmerica led a 30-year hiatus from history. It was nice while it lasted, but it’s over.\n\nThat crashing sound you heard in world markets last week wasn’t just a correction. It was the sound of the end of an age.\n\nDuring the long era of relatively stable international relations that succeeded the Cold War, markets enjoyed an environment uniquely conducive to economic growth.\n\n.. The results were extraordinary. Between 1990 and 2017, world-wide gross domestic product rose from $23.4 trillion to $80.1 trillion, the value of world trade grew even faster, more than a billion people escaped poverty, and infant-mortality rates decreased by more than 50%. The number of people with telephone service grew roughly 10-fold.\n\nThis hiatus from history was, by most measures of human flourishing, a glorious era. Now it has come to an end, or at least a pause, and the world is beginning to see what that means.\n\n.. the basic elements of economic globalization appeared firmly in place.\n\n • Russia, the most obvious challenger to the geopolitical order, was an insignificant and diminishing player economically.\n • And China, notwithstanding its rapid economic growth and its anxiety about American military power, was unlikely to challenge the economic basis of its own success. Geopolitics might have been back, but that wasn’t an issue for markets.\n\nThat complacency was misplaced. The return of geopolitics means the basic framework for economic policy has changed. In periods of great-power rivalry, national leaders must often put geopolitical goals ahead of economic ones. Bismarck’s Germany could have saved money buying armaments from Britain, but building a domestic arms industry was worth the cost. If the U.S. is in a serious strategic competition with China, an American president might well be willing to sacrifice some economic growth to banish China from important supply chains.\n\n,, by invoking “national security,” the Trump administration has found a legal basis, with roots in the Cold War and even earlier, to assert sweeping powers over the nation’s commerce. It has upended a generation of U.S. trade policy in a dramatically short period of time.\n\n.. The new era of geopolitics is unlikely to be an era of small government.\n\n.. The Trump administration is\n\n • reversing some of the regulatory excesses of the Obama era, and\n • the president’s judicial appointees are prepared to rein in the administrative state.\n\n.. A recalibration of the U.S.-China relationship was likely inevitable as the world’s oldest civilization became an economic superpower.\n\nHillary Clinton, who as secretary of state clashed with Mr. Obama over the need for a tougher approach to China, would not be a popular figure in Beijing if she had won the 2016 election.\n\nMike Pence Announces Cold War II\n\nThe administration is orchestrating a far-reaching campaign against China.\n\nDid Cold War II break out last week while no one was watching? As the Kavanaugh confirmation battle raged, many Americans missed what looks like the biggest shift in U.S.-China relations since Henry Kissinger’s 1971 visit to Beijing.\n\n.. Denouncing what he called China’s “whole of government” approach to its rivalry with the U.S., Mr. Pence vowed the Trump administration will respond in kind.\n.. The speech sounded like something Ronald Reagan could have delivered against the Soviet Union: Mr. Xi, tear down this wall! Mr. Pence also detailed an integrated, cross-government strategy to counter what the administration considers Chinese military, economic, political and ideological aggression.\n.. Navy plans for greatly intensified patrols in and around Chinese-claimed waters in the South China Sea were leaked to the press.\n.. the recently-entered trilateral U.S.-Mexico-Canada trade agreement was revealed to have a clause discouraging trade agreements between member countries and China. The administration indicated it would seek similar clauses in other trade agreements.\n.. Congress approved the Build Act, a $60 billion development-financing program designed to counter China’s Belt and Road strategy in Africa and Asia.\n.. highlighting the danger that foreign-based supply chains pose to U.S. military capabilities in the event they are cut off during a conflict.\n.. Mr. Pence warned that even higher tariffs are on the way. The White House report highlighting supply-chain vulnerabilities could provide the basis for new and more far-reaching restrictions.\n.. Business and investors may still be underestimating both the Trump administration’s determination to challenge China and the amount of economic disruption that greater U.S.-China tension can bring.\n.. To the mix of longtime China hawks and trade hawks now driving U.S. policy, national security matters more than economic friction, and many of the protestations from the U.S. business community may fall on deaf ears.\n.. Both China and the U.S. are likely to move quickly, unpredictably and disruptively as they struggle for advantage; Wall Street should brace itself for further shocks.\n.. Democrats who have relished attacking Mr. Trump for allegedly being soft on Vladimir Putin will have a hard time explaining why a hard line on Russia is a patriotic duty but a tough China policy is a mistake.\n\n.. Replacing the North American Free Trade Agreement, reshaping the Supreme Court, and launching a new Cold War in the same week is quite the trifecta. America may or may not be on the road to greatness under Mr. Trump, but it is certainly going somewhere, and at an accelerating pace.\n\na16z Podcast: Connectivity and the Internet as Supply Chain\n\n3 forms of connectivity:\n\n 1. transportation\n 2. energy: 2 million km pipelines\n 3. communications: 1 million km fiber on ocean floor\n\nWe think that states are the organizing unit, but we are moving:\n\n • from nations and borders to flow and friction\n • things become organized by connectivity\n\nThe more pipelines you build between Russia and Europe, the more resistance to turning off the routes\n\nIn the gig economy, your connectivity will affect your prosperity.\n\nPeople’s loyalty is more to their employer because their employer gives them greater access to places where their citizenship would otherwise not.", "pred_label": "__label__1", "pred_score_pos": 0.6438206434249878} {"content": "Q What should my general diet look like as a swimmer?\n\nSwimming takes up a huge amount of energy, so it’s important that you fuel your body accordingly. You’ll need carbohydrates such as pasta, brown rice and oats for energy, combined with protein to help your muscles develop. You’ll find plenty of protein in fish, lean meats and eggs. Make sure you’re also eating a wide variety of fruit and vegetables throughout the day to top up on vitamins, minerals and antioxidants. As with any sport, it goes without saying that foods that are high in fat and sugar, as well as fried or processed foods, should be avoided.\n\nQ How much protein and carbohydrate should I be eating?\n\nNow that you know what you should be eating, it’s time to work on getting the balance right. The two main areas you need to focus on as a swimmer are carbohydrates and protein. Although this will vary from person to person, a good rule to follow is to eat meals in ‘thirds’ – one third carbohydrates, one third protein, and one third fruit and vegetables. Aim to consume 1.5g of carbohydrate per kilogramme of your bodyweight per day, and 0.6g of protein. If you’re going to be competing, you can increase carbohydrate consumption slightly in the days leading up to the event to start building up energy reserves.\n\nQ What are the best foods to eat before swimming?\n\nYour body position in the water means that the pre-workout foods that you use for other sports might not be suited to swimming. With that in mind, it’s a good idea to leave at least two to three hours after a full meal before you swim, and an hour following a snack. When eating directly before a swim, focus on carbohydrates with a high Glycaemic Index (GI). High GI foods are digested quickly, and therefore give your body an immediate source of energy. You’ll need to experiment with what works best for you, but good options include isotonic sports drinks, fruit, and energy gels. When eating two to three hours before your swim, low GI foods like pasta, nuts and oats will provide slow release energy, so you’ll have plenty left in the tank when it’s time to train.\n\nQ Do I need to eat mid-swim?\n\nUnless you’re going to be swimming for over two hours (for example an open water swimming event or endurance training sessions) you shouldn’t need to eat anything while swimming. However if you are going to be in the pool for a long time, you need to plan how you’re going to fuel yourself come the two hour mark, or you risk hitting the dreaded ‘wall’. Small pieces of fruit are a good option if you can stomach them, but a lot of people have digestive issues when trying to consume solid foods in the water. If that’s the case, try taking an energy gel every 45 minutes after you’ve been in the water for two hours.\n\nQ Do I need to drink while swimming?\n\nIt might sound strange, but you’ll actually become dehydrated quicker when you’re in water than you would out of it. The warm, humid air in a pool means you can become dehydrated in under 30 minutes, so it’s important to take regular breaks to maintain fluid levels. For sessions under an hour, drinking water will be perfectly fine. Anything over that and you’ll start to lose electrolytes, which should be topped up with an isotonic sports drink. Remember to look out for the usual signs of dehydration – darker urine, headaches, and of course, thirst.\n\nQ What foods should I avoid before swimming?\n\nThere are certain foods that are a strict no-go before you hit the pool. Anything that is fried or high in fat will be hard for your body to digest, leading to discomfort in the water. Even healthier foods can cause indigestion if eaten immediately before your swim, so it’s a good idea to avoid any low GI foods in the hour before your swim. Again, this is because these foods take longer to digest, and can cause feelings of sluggishness and discomfort in the water.\n\nQ What should I eat after a swim?\n\nA key (but often overlooked) aspect of swimming nutrition is what you eat after a training session. After you’ve pushed your body to the limit in the pool, it’s vital that you focus on refuelling, rehydrating, and recovering. The key recovery period is 30 to 60 minutes after your workout, so aim to eat a snack that’s high in carbohydrates and protein in this period. Carbohydrates will bring your energy levels back up, while protein will aid muscle recovery and development. What you eat is down to personal preference, but fruit works well, as do protein shakes.\n\nQ What can I eat to avoid muscle cramps?\n\nMuscle cramps in the legs and feet are a common occurrence while swimming, and while you might think they’re the result of an insufficient warm up or injury, they could also be linked to your diet. Cramps are often a result of low levels of potassium in the body, so foods that are high in potassium like bananas make for the perfect pre-swim snack. Likewise, magnesium has been found to prevent muscle cramps. Magnesium supplements are popular with swimmers for this reason, but if you would prefer to avoid them you can snack on nuts instead.\n\nSource: Swimming Training Nutrition FAQs | realbuzz.com", "pred_label": "__label__1", "pred_score_pos": 0.9421870112419128} {"content": "Home Page\n • D\nIf your child is starting school in September 2021 please take the time to explore our website. Our Headteacher would be delighted to chat to you and answer any questions.\n\n\nThe Computing Subject Leader is Mrs Sue Fuller.\n\n\nAt Selborne Church of England Primary School we want children to be masters of technology. Technology is everywhere and will play a pivotal part in our children’s lives. Therefore, we want to model and educate our pupils on how to use technology positively, responsibly and safely. We want our pupils to be creators not consumers and our broad curriculum encompassing computer science, information technology and digital literacy reflects this. We want our pupils to understand that there is always a choice when using technology and as a school we utilise technology (especially social media) to model positive use. We recognise that the best prevention for a lot of issues we currently see with technology and social media is through education.\n\n\nPlease see the documents below to gain a full understanding of our Computing curriculum here at Selborne including the intent, implementation and impact which can be found in the subject policy.\n\nSquirrels class have enjoyed using the Bee Bots. They tried giving them different instructions and then they made simple obstacle courses for the Bee Bots to go around.\nThe children in Rabbits class have been learning about algorithms and how to give instructions. They had to pretend they were robots and give each other clear instructions so they could move the blocks from one pot to another. We call this unplugged coding.\nThen Rabbits class gave instructions to the Blue-Bots. The children were challenged to get from one place on their map to another. They input the instructions to the Blue-Bot and then pressed go! Sometimes it didn't go where they thought it would and they had to work out why their instructions were wrong - this is called debugging.\nOtters class were learning about plants in science. They looked at paintings and photos of different plants and then used Revelation Natural Art to recreate these pictures on the computer.\nBadgers class have been learning about the Mayans. They used Scratch to create quizzes and test each other's knowledge of the Mayan civilisation.", "pred_label": "__label__1", "pred_score_pos": 0.6614313125610352} {"content": "The USA and the EU have imposed economic sanctions on Russia in response to the Russian annexation of Crimea.\n\nThe US has imposed restrictions on the exports of defence equipment and blacklisted numerous Russian officials, with the EU performing similar attempts to punish Russian actions.\n\nEconomic sanctions have been readily deployed by various international players over the past twenty-five years. The prolific use of economic coercion in this time has far outstripped the prevalence of sanctions in any other era. However, in an age where information is freely available and perception is everything, is the threat of action more important than the result?\n\nA commonly held argument is that if a state does not yield to the threat of sanctions, it is unlikely to succumb to their implementation. Simply speaking, if the government of the ‘offending’ nation believes that the political gains of non-compliance outweigh the economic damage, they are incredibly unlikely to back down until further pressure is deployed.\n\nPutin’s Russia is in this position.\n\nTo illustrate this, look no further than Iraq. Between 1991 and 1996, 48% of Iraq’s GNP was destroyed. This was achieved through a near total embargo on trade and finance and specific asset freezing of governmental elites.\n\nThe main aim of the sanctions, enforced by the UN Security Council, was simple: to force Iraq to withdraw from Kuwait. However, as we know, it took a major offensive and the loss of thousands of lives to finally force the Hussein regime to back down.\n\nThe Iraqi government however, survived the conflict. This is partly due to what is often called a ‘rally round the flag’ phenomenon. Even when the physical threat to Iraqi soil was over, the perception of Iraq being under attack from foreign interests allowed the regime to create a war society.\n\nHorrendous living conditions, a lack of basic health care, an absence of nutritious food – many ever present hardships were ignored as the sanctions were made to appear as an attack on national sovereignty.\n\nA sense of unity, founded through anti-coercer sentiment, allowed the Ba’athist regime to justify the use of arbitrary control and remain unapologetic about the condition of the people – after all, it was ‘not their fault’.\n\nIn more contemporary examples of sanctions – those over Iran’s nuclear programme or Syria’s human rights violations for example –  a large part of their refusal to comply has been due to this often deeply embedded feeling of anti-Americanism.\n\nIt can be argued that sanctions form an important stepping stone between ‘words and war’. They allow a nation or organisation to act without the expense and guilt that accompany armed conflict. However, as illustrated in the numerous examples including Iraq and Yugoslavia, sanctions alone were not effective enough – they had to be supported with military action.\n\nIt is therefore the words that are the most important aspect of sanctions, with their implementation relatively unimportant. Sanctions allow a collective of international players to establish a positive identity on the world stage.\n\nThe ongoing negotiations regarding Iran’s nuclear programme provide an interesting example of this. It can be seen as somewhat ironic that the USA, proud owner of the largest thermo-nuclear arsenal on the face of the earth, can dictate that other nations are not allowed to match her capability. Furthermore, by neglecting to allow Iran to develop its nuclear capability, it restricts its opportunities to develop nuclear energy – an increasingly attractive prospect in such uncertain times.\n\nBut what the imposition of sanctions has achieved for the USA is a positive image. The USA is generally seen as the morally upstanding nation, denying the dissident nations powerful and destructive weaponry, enforcing ‘democracy’ and ‘liberating’ oppressed peoples. The USA’s conduct is irrelevant because of the successful creation of an ‘evil other’, against whom they will always be perceived positively.\n\nPutin will not withdraw from Ukraine. Pro-Russian support in Crimea is too high. Any military action would force Crimea to be part of a nation it rejects. For Putin, the political gains outweigh the economic costs – costs which will surely peter out as Western leaders realise their futility. But by that point, lines will have been drawn.\n\nThis is the true power of economic sanctions. They allow the lines to be drawn between what is acceptable and what is not, but more importantly who is acceptable. It is irrelevant whether the stated aims of sanctions are achieved because first and foremost, they create two teams.\n\nIn essence, the ‘good guys’ versus the ‘bad guys’. But this isn’t a Disney film, and both sides want to win.", "pred_label": "__label__1", "pred_score_pos": 0.9954380393028259} {"content": "The Challenge for Liberalism\n\nThe year 2016 has demonstrated that the West, the liberal order the Arab World sought to become a part of, was going through an identity crisis of its own.\n\nFew predicted the Arab awakening that swept through the Middle East and North Africa in 2011. It served as a reminder for Arab leaders that their constituents, especially the youth, were tired of the perpetual political status quo that had created and enabled the repressive regimes to stay in power for over three decades. The youth demanded their right to join the liberal world order and reap the benefits that would come with it: democratic institutions, better governance, a more open society, and economic growth. They were in search of meaning, for their identity as young Arab members of liberal societies.\n\nThe year 2016 has demonstrated that the West, the liberal order the Arab World sought to become a part of, was going through an identity crisis of its own. In many liberal democracies those who feel left out, pushed aside, or forgotten by their establishment politicians spoke out for change, against the maintenance of the status quo. Few analysts predicted that Britain would leave the European Union, that Donald Trump would become the next president of the United States, or took seriously the rising tide of rightwing populist politics gaining ground in Europe and beyond. The rise of populism in the post-2008 financial crisis era has demonstrated that liberal democratic systems were neither perfect nor immune to an awakening in the age of globalization.\n\nThere are many reasons for this. The appeal of populism in the West grew when economies became sclerotic and establishment politicians seemed to favor the status quo. Wages stagnated, jobs for decades had moved from the rural areas to the urban centers, and low-paying jobs offshored to India and China. At the same time, education and living costs increased while political leaders assured their constituents that things were getting better. The richest 1 percent were getting richer, which to many indicated that globalization was benefitting mostly the wealthiest sectors of society, the elites, who had the resources to benefit from offshoring and the seemingly borderless flow of capital from London to New York to Hong Kong. The political and corporate elites appeared above the law while heavily regulating the lives of others.\n\nFor many the frustration that ensued is exacerbated by the liberal and internationalist norms that come with globalization and are espoused by many elites and cosmopolitans: more openness, be it in terms of free trade or the promotion of multiculturalism and diversity.\n\nEspecially after the start of the Syrian civil war and the subsequent refugee crisis overwhelming the European Union, immigration has become an increasingly contentious issue. Immigrants, coming from the global south, were seen not only as catalytic, stealing the jobs of the working class, but more importantly as changing the social fabric in many Western countries. Even though globalization had increased the flow of capital, goods, information, ideas, and people, it had not undermined attachment to national identity or enhanced the level of tolerance in our societies. Globalization and cosmopolitanism have failed to offer the same sense of belonging that adherence to national identity can foster. In fact, for many, globalization had resulted in the degradation of their nations. Populist slogans that tout the need to “take back control” and “restore our country” appeal to those feeling alienated by globalization and cosmopolitan norms that impinge upon national sovereignty.\n\nPeople began to lose their faith in international and regional institutions whose job was to facilitate the process of globalization and economic integration while maintaining and promoting the liberal international order. The forces opposing globalization saw their countries being bound by transnational rules and international laws that reduce policy options available to domestic policymakers, thus impinging upon their national sovereignty. Russian President Vladimir Putin has argued that this liberal world order was politically motivated and directed by the West. Many governmental authorities in the Middle East and beyond share this belief. Thus, the politics of Putin and Trump are seen by many as a positive force in the global arena, steering the focus from promoting liberalism to a more realist approach to domestic affairs and international diplomacy.\n\nThe current world order was established in 1945 after World War II. This order has resulted in the longest period of peace among states and spurred unprecedented economic growth, especially in the West. It has also brought Europe from the brink of destruction, lifted millions out of poverty throughout the world, and spread new freedoms to many countries. However, the liberal world order has failed to secure national and other in-group identities. The promise of secular democracy based on liberalism has not been able to offer citizens a strong enough sense of meaning and belonging. It is not only the Middle East where young people are losing faith in politics; in the West people are becoming tired of the technocrats in liberal democracies maintaining the status quo.\n\nDespite its flaws, in liberal democracies the possibility of compromise exists. However, leaders must uphold the democratic institutions and traditions that guarantee equal rights for everyone. In the Arab awakening many had a very naive understanding of what it means to be a citizen: what the responsibilities and obligations are. It now seems that citizens in liberal democracies have forgotten what it means to be a citizen. Many of them have not engaged in politics and have let their representatives function on their own. Liberal Western democracies have to have frank discussions about the limits of liberalism and define what it means to be a citizen of a liberal democracy. Democracy, especially liberal democracies, will only satisfy aspirations if their citizens actively participate in defining and evaluating policies governing issues in the public domain.\n\nLet’s not, however, draw the wrong conclusions. Recent events do not prove that the aspirations of the Arab awakening or the principles of Western liberalism are wrong. But the turmoil and call for change did underline that both required wise leaders and inclusive governance.\n\nNabil Fahmy, a former foreign minister of Egypt, is the dean of the School of Global Affairs and Public Policy at the American University in Cairo. He served as Egypt’s ambassador to the United States from 1999–2008, and as envoy to Japan between 1997 and 1999. On Twitter: @mnabilfahmy.", "pred_label": "__label__1", "pred_score_pos": 0.9286226034164429} {"content": "Boom in Cloud-Based and AI-Driven Accounting Predicted for 2021\n\nby: The Knowledge Group\n\nJanuary 06, 2021\n\n\nAs artificial intelligence (AI) and cloud-based computing both continue to play an increasingly prominent role in the way we conduct business, more and more industries are starting to experience the impact of these accelerating technologies. Based on current trends, it’s now no stretch at all to say AI and cloud computing alike are going to have an even more significant role in accounting services heading into 2021 and beyond.\n\nThe move to online workflow management brought by the COVID-19 pandemic is one driving force behind this acceleration of AI and cloud computing technologies in the accounting sphere, but the industry has been heading in this direction for some time now. A 2020 survey showed that 55% of accountants say that they plan to make use of AI within the next three years, while a separate 2019 survey showed that 94% of accountants are already making use of cloud services in some manner.\n\nSo how are these two technologies set to impact the accounting industry heading into the new year? The possibilities are broad, but there are a few ways that we can realistically predict how AI and cloud computing are set to shape accounting in the years to come. The first of these is an increase in automated solutions that will both enable accountants to save time and money while also enabling their clients to access self-service accounting solutions. Another near certainty is that increased reliance on cloud computing in the industry will foster more efficient remote collaboration between accountants and their clients as well as the ability to access real-time insights more easily across companies and platforms. Perhaps most interesting, though, is the fact that AI may enable accountants to create no-code or low-code software solutions for their clients on demand, creating the possibility for a fascinating new service that would not have been possible just a few years ago.\n\nOf course, these are just a few of the ways that these technologies are set to impact the accounting industry in the years to come, and exactly what the future holds in store for the industry and the way it utilizes AI and cloud computing technologies is still wide open.\n\nNote: The Knowledge Group continuously produces webcasts on this topic and other hot-buttons issues relating to Technology to keep you ahead of the curve.", "pred_label": "__label__1", "pred_score_pos": 0.9959568381309509} {"content": "Separation of N2 and CO2 from natural gas using graphene to reduce the environmental pollution\n\nDocument Type : Original Article\n\n\n1 Department of Chemical Engineering, Petroleum University of Technology, Abadan, Iran\n\n\n3 Department of Biochemistry, Faculty of Biological Sciences Tarbiat Modares University, Tehran, Iran\n\n\nNatural gas consists of light hydrocarbons with methane as a major component. However, undesired components such as nitrogen, carbon dioxide, hydrogen sulfide and water vapor may accompany with major hydrocarbon mix in natural gas. Removing these nuisance components is usually a major task in industries, especially in petrochemical plants where natural gas is exploited as plant feed or in case environmental or safety issues are of any concern. High tech separation of these minor impurities from the major hydrocarbon body of natural gas may be achieved using single phase technologies such as molecular sieve or membrane technologies. The later technique, however, has a more promising horizon, if a feasible membrane such as graphene is exploited. Porous graphene membrane with high permeability, high selectivity, suitable geometry and suitable size are very hopeful for membrane separation of gases. Therefore, it is expected that porous graphene membranes will develop in industry to achieve effective membrane separation technology for natural gas process and other gas separation process.", "pred_label": "__label__1", "pred_score_pos": 0.7033195495605469} {"content": " The Rime Of The Ancient Mariner Meter // mars-bet.com\n\nAnalyze The Rime of the Ancient Mariner as a..\n\nGet an answer for 'Analyze The Rime of the Ancient Mariner as a narrative ballad with a message. How has Coleridge used the various features of a ballad in this poem?' and find homework help for. The Rime of the Ancient Mariner originally \"The Rime of the Ancyent Marinere\" is the longest major poem by the English poet Samuel Taylor Coleridge, written in 1797–98 and published in 1798 in the first edition of Lyrical Ballads. Modern editions use a later revised. The Rime of the Ancient Mariner: Structural Critique Essay 1843 Words Apr 24, 2013 8 Pages Within the poem considered his most famous work, Samuel Taylor Coleridge uses an abundance of literary devices to contribute to the effect of the poem. 11.01.2011 · what is the rhyme meter and foot of this stanza from \"the rime of the ancient mariner\"? “He prayeth best,who loveth best. All things both great and small; For the dear God who loves us, Hemade and loveth all.” best answer will be chosen. Answer Save. 3 Answers.\n\n09.02.2012 · 50 videos Play all Mix - Iron Maiden - Rime of the Ancient Mariner [Flight 666 DVD] HD YouTube Iron Maiden - Empire Of The Clouds - Duration: 18:11. Mihailo Djuric 5,184,787 views. The Rime Of The Ancient Mariner Analysis 962 Words 4 Pages. Desiree Marion Marjorie Levinson English 451 15 November 2017 Symbols and Symbolism in The Ancient Rime of the Mariner The poem, The Rime of the Ancient Mariner by Samuel Coleridge, is a poem about death and death-in-life. The mariner is a symbolism of retribution, and a liminality.\n\n24.12.2012 · Live After Death es un álbum doble en vivo de la banda británica de heavy metal Iron Maiden, lanzado el 14 de octubre de 1985. Durante el transcurso de la gira World Slavery Tour fue grabado el. «The Rime of the Ancient Mariner» er eit dikt skrive av den engelske diktaren Samuel Taylor Coleridge frå 1797 til 1798 og gjeve ut i den første utgåva av samlinga Lyrical Ballads i 1798. Det er det lengste viktige diktet Coleridge skreiv.\n\nThe Rime of the Ancient Mariner essays are academic essays for citation. These papers were written primarily by students and provide critical analysis of The Rime of the Ancient Mariner by Samuel. 04.02.2020 · The Rime of the Ancient Mariner by Samuel Taylor Coleridge is one of the most-referenced pieces of Romantic poetry. Ever heard \"Water, water everywhere and not a drop to drink\"? Yup, it's from here although in the original text it's ''nor any. The Rime of the Ancient Mariner is a typical ballad by Samuel Taylor Coleridge. It deals with a single situation or incident, and though there are many incidents, they are also introduced so as to look like parts of the one major event. The situation is presented dramatically. The poet makes use of striking dialogues, and the effect is enhanced by repetitions, known as ‘refrains’. The Rime of the Ancient Mariner. Argument: How a Ship having passed the Line was driven by storms to the cold Country towards the South Pole; and how from thence she made her course to the tropical Latitude of the Great Pacific Ocean; and of the strange things that befell; and in what manner the Ancyent Marinere came back to his own Country. Anna Barbauld may have believed that The Rime of the Ancient Mariner had no moral, but Coleridge is correct when he insists that “the poem had too much” qtd. in Coleridge 6: 272. The moral of his ballad is to appreciate all forms of life. To develop this theme, Coleridge utilizes imagery and symbolism to create an implicit partnership between Life-in-Death and the Moon.\n\nThe Rime of the Ancient Mariner study guide contains a biography of Samuel Coleridge, literature essays, a complete e-text, quiz questions, major themes, characters, and a full summary and analysis. The Rime of the Ancient Mariner Remember: this poem appeared in a book of poetry called Lyrical Ballads, published in 1798. Two friends wrote the collection together, Samuel Taylor Coleridge and William Wordsworth. They didn’t intend to necessarily begin.\n\nThe Rime of the Ancient Mariner Essays.\n\nIron Maiden - Rime of the Ancient Mariner.\n\nthe rime of the ancient mariner analysis symbolism, imagery, allegory in pretty much any poem or novel about life at sea, you can expect quite lot of attention. Sign in Register; Hide. Analysis - The Rime of the Ancient Mariner - Samuel Taylor Coleridge. Summary. University. StuDocu University. 05.02.2020 · The Rime of the Ancient Mariner - It is an ancient mariner. Beneath the lamp the lady bowed, And slowly rolled her eyes around; Then drawing in her breath aloud, Like one that shuddered, she unbound The cincture from beneath her breast: Her silken robe, and inner vest, Dropt to her feet, and full in view, Behold! her bosom, and half her side— A sight to dream of, not to tell!\n\nEngros Medisinske Hansker\nTerry Cloth Forkle\nGodzilla Full Movie\nVinterfrisyrer 2019 Black Female\nPremier League-tabell Siden Januar 2018\nHvit Middels Puddel\nGrå Og Hvite Baderomsbilder\nPlanet Gull Genser Kjole\nKey Bank Brewer\nGlenfarclas 12 Amazon\nSkjørbug I Dyr\nEn Lieu Definisjon\nAdventsuke 3 Bønn\nBilder Av Forskjellige Typer Marihøner\nVerdens Beste Slakterbutikker\nSlik Legger Du Til Spilleliste I Google Hjem\n10 Ord Om Ordentlig Substantiv\nXiaomi Redmi Note 6 Gearbest\nTakkens Herre\nUnion University Stipend\n2019 Nissan Rogue Hybrid Hybrid Suv\nFull HD 4k Bakgrunnsbilde For PC\nArt Van King Size Sengsramme\nAdidas F10 Fg\nNissan Space Saver Wheel\nWeight Watchers Soup Recipes UK\nListe Over VM-kamper 2018\nJournal Of Cell Biology Citation\nHeaders Car Lot\n7 Tonn Metall\nEksporter Google-søkeresultater Til Csv\nHvordan Ringer Du En Gruppe På IPhone\nPink Geode Cake\nGls 550 Mercedes 2018\nSkilsmisse Skrifter Kjv\nBare Barnesenger\nTraeger Salmon Vodka\nLiv Og Farge Sitater\nLerret Los Medanos\nMarc Fisher Trofaste Plattform\nsitemap 0\nsitemap 1\nsitemap 2\nsitemap 3\nsitemap 4\nsitemap 5\nsitemap 6\nsitemap 7\nsitemap 8\nsitemap 9\nsitemap 10\nsitemap 11\nsitemap 12\nsitemap 13\nsitemap 14", "pred_label": "__label__1", "pred_score_pos": 0.9997178316116333} {"content": "United States Marine Band (Pennsylvania) : The oldest professional musical organization in the United States\n\n\n\n\nThe Marine Band has been uniquely known as \"The President's Own\" since 1801 due to the historic connection to the President of the United States. The relationship between the Marine Band and the White House began on New Year's Day 1801, when President John Adams invited the band to perform at the Executive Mansion.\n\nLater that year, Thomas Jefferson initiated the tradition of Marine Band performances by requesting that it perform at his inauguration. The Marine Band has played at every United States presidential inauguration since. President Thomas Jefferson gave the title \"The President's Own\" in 1801. This terminology emulated a long-established British usage, where various military units were designated as \"King's Own\" or \"Queen's Own\".\n\n\nAccording to wikipedia\n\nXiang Yun (Collect and Nominate for the U.S. Record) - USKings (Source of photos: internet)\n\nVIETKINGSWorldKings journeys\nINDOCHINAUSkings journeys\nIndia Book of RecordsWCSA\nCAMBODIA BOOK OF RECORDSWorld Records University\nWorld Creativity Science Park", "pred_label": "__label__1", "pred_score_pos": 0.6012915968894958} {"content": "What Music Makes Babies Smarter?\n\nCan classical music make babies smarter?\n\nIts primary scientific support comes from a 1993 study showing that classical music temporarily improved college students’ scores on two parts of a general intelligence test.\n\n\nWhy music is good for your brain?\n\n\nWhat music is good for baby brain development?\n\n\nDoes Mozart help baby brain development?\n\n\nDoes Mozart really make babies smarter?\n\nListening to classical music may soothe your baby and turn her into a classical fan later in life, but it won’t make her smarter. Despite popular sentiment, the evidence that listening to classical music made anybody smarter was tenuous at best. …\n\nCan music be too loud for baby in womb?\n\n\nDoes music help baby brain development?\n\n\nCan music make you more intelligent?\n\n\nIs the Mozart effect real?\n\nA meta-analysis of studies that have replicated the original study shows that there is little evidence that listening to Mozart has any particular effect on spatial reasoning. The author of the original study has stressed that listening to Mozart has no effect on general intelligence.\n\nWhat foods develop baby’s brain?\n\n\nWhen can a fetus hear Dad’s voice?\n\n\nShould I play music for my baby in the womb?\n\nNot at all. Any healthy activity that you enjoy or find relaxing while you are pregnant will have a positive effect on your baby. Further, if you sing along while you listen, your baby hears your voice and develops familiarity with what you sound like and with the melodies you enjoy.\n\nDoes listening to music in the womb make babies smarter?\n\nIf classical music does make a difference in a baby’s IQ, it’s probably a very slight difference. If you like classical music, by all means, play it. It definitely can’t hurt. Researchers believe that babies can hear outside sounds while in the womb.\n\nIs Mozart good for brain?\n\n\nCan music make you happy?\n\nMusic touches us all deeply, in ways that range from the obvious to the inexplicable. It can make us feel happy, sad, reflective, anxious, thrilled, angry, excited, joyous and/or relaxed. … Music also boosts your immune system and can create positive emotional experiences — it even helps relieve pain.\n\nIs there a correlation between music and intelligence?\n\nOn the Association Between Musical Training, Intelligence and Executive Functions in Adulthood. Converging evidence has demonstrated that musical training is associated with improved perceptual and cognitive skills, including executive functions and general intelligence, particularly in childhood.\n\nWhat music should a pregnant woman listen to?\n\nWhat music should a pregnant mother listen to? In the third trimester, the baby will be definitely able to hear the music you play. Classical music, gentle sounds like lullabies, nice melodies that inspire happiness all are designed to be soothing.\n\nDoes Mozart make you more intelligent?\n", "pred_label": "__label__1", "pred_score_pos": 0.9639766216278076} {"content": "Question: How Long After You Miss Your Period Should You Worry?\n\nIs it possible to miss a period for a month?\n\nNo period this month.\n\nTry not to freak out.\n\nIt’s normal miss a period once in a while.\n\nIt could just be your body’s response to stress or changes in your eating or exercise habits..\n\nHow many days late can a period be before worrying about pregnancy?\n\nA menstrual period is considered late if it hasn’t started 5 or more days after the day you expected it to start. A period is considered missed if you have had no menstrual flow for 6 or more weeks after the start of your last period.\n\nCan your period be 7 days late and not be pregnant?\n\n\nWhat are symptoms of not having a period?\n\nDepending on the cause of amenorrhea, you might experience other signs or symptoms along with the absence of periods, such as: Milky nipple discharge. Hair loss. Headache.\n\nIs white discharge a sign of period coming?\n\n\nWhat do pregnancy boobs feel like?\n\nDuring the earliest weeks of pregnancy, breast pain tends to be dull and achy. Your boobs may feel heavy and swollen. They can be super sensitive to the touch, making exercise and sex play very uncomfortable.\n\nHow do you self check your stomach for pregnancy?\n\n\nHow do you tell if you’re pregnant without a test?\n\n\nWhat are some unusual signs of early pregnancy?\n\n\nHow soon do pregnancy symptoms start?\n\n\nWhen should I go to the doctor if my period is late and pregnancy test is negative?\n\n\nCan stress delay period for 2 weeks?\n\n\nCan period be delayed by 10 days?\n\n\nWhat does pregnancy discharge look like?\n\n\nCan you miss a period and not be pregnant?\n\n\nShould I be worried if I missed a period?\n\nMissing one or two periods is completely normal, and not generally a cause for concern. But if you’ve missed more than a few months, it’s time to see your doctor.\n\nWhy am I having pregnancy symptoms but a negative test?\n\n\nWhen should I go to the doctor if my period is late and I not pregnant?\n\nAs long as you are sure you are not pregnant and you feel well in yourself there is no need for concern. If you don’t have a period for 3-6 months, or have other symptoms then you should see a doctor. Sometimes periods in teenage girls start later than in others.\n\nHow many days after missed period?\n\n\nHow long after a missed period should I go to the doctor?\n\nThe American Pregnancy Association recommends you make an appointment with your doctor for your first prenatal visit within eight weeks of your last menstrual period (LMP). Even if you’ve been pregnant before, every pregnancy and every baby is different.\n\nIs my period coming or am I pregnant?\n", "pred_label": "__label__1", "pred_score_pos": 0.7607148885726929} {"content": "Sign In\nNot register? Register Now!\nEssay Available:\n2 pages/≈550 words\n2 Sources\nLiterature & Language\nEnglish (U.S.)\nMS Word\nTotal cost:\n$ 7.2\n\nArchetypal Approach in James Baldwin‘s Sonny's Blues (Essay Sample)\n\n\nI need an essay analysis of the poem \"sonny's blues\". I have provided the 2 source links for you to use and you dont need to cite them at the end, only use them to complete the work, all I need is a written essay;\na 550-1000-word paper, apply ONE of the four critical approaches(formalism, archetypal, psychological, mythological) to analyze the selected work. You must incorporate research from two scholarly sources(i have provided you with the sources), along with quotes from the work, all documented in MLA format.\nThe essay should have the following elements:\na meaningful title;\na clear introduction of the theory in the first paragraph that you will be applying to the text that you have chosen;\na clearly identifiable thesis statement at the end of the introduction that explains why an application of this theory can help readers discover meaning;\nat least three body paragraphs, each of which contains a topic sentence and supporting sentences;\nspecific evidence (examples and quotes) from the chosen text in the body paragraphs;\na clear conclusion.\na word count (550-1000)\n\nArchetypal approach in James Baldwin‘s Sonny's Blues\nThe archetypal approach focuses on form and function elements to understand the meaning of a literary work grounded in cultural or psychological myths. Sonny is the archetypal jazz musician alienated from the mainstream society because of their penchant for drugs. The focus on Black music including jazz and blues in downtown Harlem showing that music is like a medium achievement for the African Americans. Despite Sonny visiting bars frequented by the working class blacks, it is the narrator’s snobbish behavior that makes it hard for him to understand Sonny’s penchant for music. This paper highlights the archetypal approach with the character of Sonny’s the archetypal image of a creative musician who is misunderstood, but also representing the expectations of the working class blacks.\nTo highlight the alienation of Sonny the aspiring musician is the narrator’s uninspiring perspective on music as a career. However, Sonny’s romantic pursuit of music seems irrational at first, but the narrator gets to acknowledge the power of music towards the end as Sonny performs. There are clear class divisions between the two brothers with the narrator keen to maintain conservative ideals, while supporting the status quo. However, Sonny has a different perspective, and is more radical and in a hurry to participate in social changes. The alienation of Sonny is also because of his choices to protest and act against the norm, but Baldwin also sees this as a way for redemption when the narrator alludes to being free after listening to Sonny’s performance. Sonny finds acceptance in the jazz club away from the isolation and judgment of other people (McParland 132).\nSonny is misunderstood by his older brother and his wife for his non-conformity...\nGet the Whole Paper!\nNot exactly what you need?\nDo you need a custom essay? Order right now:\n\nOther Topics:\n\n • Interrogational Torture is Ever Acceptable\n Description: Using torture and brutal techniques of interrogation against terrorist suspects is commonly used to retrieve information from suspects and to prevent terror attacks...\n • Themes in The Great Gatsby\n Description: Scott Fitzergerald ,one of the most accomplished writers of his time, exudes his almost extraordinary creativity and factual analysis of the American Dream in the book The Great Gatsby...\n • Hero Traits\n Description: In this story, Arcite and Palamon formed a single character analysis since they have the same personality, and they have everything that qualifies them to be knights...\nNeed a Plagiarism Free Essay?\nSubmit your instructions!", "pred_label": "__label__1", "pred_score_pos": 0.9886484146118164} {"content": "Power Tools for Power Struggles\n\nDo you ever feel like no matter how much you prepare for the day, nothing seems to go the right way? Your day-to-day power struggles with your child or client never seem to get easier and you have given it your blood, sweat, and tears. Where’s the relief and satisfaction in feeling like you have done a great job as a parent, teacher, or clinician? Good news! There is hope! The focus of this blog post is to provide “easy to use” evidenced-based antecedent intervention tools (power tools) to ease those daily power struggles. These power tools are proactive measures to help increase desired behaviors as well as decrease the likelihood of undesired behaviors.\n\nWhat are these proactive measures? I bet you are sitting there and asking yourself, “Okay, really? What are these ‘proactive measures’ and are they really going to help?” Let’s talk about it! Proactive measures are antecedent interventions that take place right before a behavior happens. An Antecedent is an environmental condition or stimulus change that occurs immediately before a behavior. There are many countless examples of environmental conditions or stimulus changes, for example, having a clean or cluttered home, an unexpected situation that comes up, a change in routine, lights flashing, scratchy clothes, hearing a loud noise, textured food, etc. A good way to look at it is that a stimuli is an energy change that affects any of your five senses: touch, taste, hear, see, and smell. This change in energy increases or decreases the likelihood of a behavior to happen.\n\nAgain, you say, “So, what are they?” These 4 tools are preference/choice, priming, timers, and pairing. This blog will go into detail for each “power tool” and how to apply these strategies with your child or client. Your day-to-day activities with your child or client will become more enjoyable with the hopes to decrease those power struggles.\n\nPreferences/Choices Adults or children with any comorbidities that inhibit their day to day lives should still be allowed to voice their opinions, preferences, and feelings as their abilities allow, whether it is a simple preference or a complex decision. The number one commitment as a parent, teacher, or clinician is to keep your child safe. The decisions that are made come from the idea that you always “know what’s best” for your child and naturally, it overrules your child’s choice and preference. Start to think about what areas can you compromise in? How can the environment be manipulated to provide not only options but preferred options requested by your child? What’s feasible? The choices provided should be preferred options that your child enjoys. Here are some examples that you might be able to relate to.\n\n 1. Change Is OK\n\nWe have grown to adapt to schedule changes on a daily basis. Sometimes our days change for the better and sometimes our days change for the worse. It’s the same for your child. Allow your child to choose different activities that they would like to do throughout the day. Visual schedules are highly recommended to help them stay on track but it is not always necessary depending on your child’s needs. It’s OKAY to switch up a daily schedule, especially if it is in favor of your child and it is safe and feasible to do. It is also OKAY to follow through with important events throughout the day such as appointments that can’t be rescheduled. Find a healthy balance between which events are truly important and which events can be flexible.\n\n 1. Provide Prefered Options\n\nSometimes going from one hard activity to the next can decrease motivation, so providing preferred options gives your child the opportunity to have a voice as well as nourishes independence. Parents who are responsible for making decisions for their children end up making decisions based on their own interests of time, money, protectiveness, and preference instead of the child’s preferences. Including your child in decision making is equally as important as thinking about your child’s best interest, safety, and pursuit of happiness.\n\n 1. Reinforcement!!!\n\nYou would like your child to put his/her clothes on within a reasonable time. Before placing the demand to clean the room, motivate him/her by providing 2 to 3 options for preferred reinforcement when the task is complete. Following through with this will establish behaviors over time as well. Stay strong! If your child does not complete the task, provide less preferred activities, and limit access to those highly preferred options.\n\n 1. Set Boundaries and Provide Alternatives\n\nWhen an activity is not available such as playing baseball in the house, instead of taking away their toys, change the environment to a safer area such as outside or a nearby park. Another great example is when your child wants to color on a chair. Instead of taking away the markers, set boundaries and options as to where he can color (kitchen table, outside, on the tile floor with newspaper underneath). Providing these options can begin to ease power struggles and increase appropriate behaviors.\n\nIn conclusion, provide simple, PREFERRED options (no more than 2-3) to accommodate your child’s needs. Allow your child to have a voice in his/her day to day activities. Motivate your child to complete difficult tasks by providing highly preferred activities or choices once the activity is complete. Establish boundaries and provide options BEFORE a behavior. Manipulate the environment to increase or decrease the likelihood of a behavior to happen.\n\nPriming What’s That? The book, Effective Practices for Children with Autism, defines priming as a type of antecedent intervention in which the target behavior is practiced immediately before being performed, and priming sessions consist of verbal modeling and instruction to perform a behavior, followed by reinforcement of that behavior. In other words, Priming is a verbal or modeling action to show your child how to do something, to explain what is expected, or to express what will happen before the behavior or event takes place. Think of priming as a warning or a reminder of what is going to happen. Some examples are shown below.\n\n 1. Modeling and verbal communication through priming \n\nBeing able to effectively communicate with your child through modeling and verbal communication is crucial to your child’s growth. One important factor in priming through modeling and verbal communication is to make sure your physical actions are not only the desired actions you want your child to imitate but that these actions are presented BEFORE your child engages in the activity as well as having clear and direct verbal communication. For example, you can tell your child, “When it is time to clean your dishes, I want you to do it like this,” and then show your child the correct way to clean the dishes.\n\n 1. What’s expected? \n\nPrime your child by letting him/her know what is expected. An example of this is saying, “Remember to walk in the street,” before your child begins to walk in the street. Priming can promote safety and awareness for your child. Additionally, reinforcing this behavior will increase independence in which you will be able to fade your priming prompts out. Another great example of priming is reminding your child to keep safe hands and body, especially around their peers. This simple reminder can create positive interactions with your child and other peers. Simple reminders of what is expected and setting boundaries with your child is a great way to decrease those power struggles.\n\n 1. What will happen? \n\nPrime your child by letting him/her know what is going to happen. For example, you can tell your child, “In about 2 minutes we are going to turn the t.v. off and eat dinner.” Being able to explain what is going to happen before it happens allows your child to prepare for a change within the environment. Another example is alerting your child for any immediate or future change in plans. Giving your child time to process a changing environmental factor and being able to help your child go through that process before the change happens, will reduce anxiety in both the parent and the child.\n\nIn conclusion, The way you can prime your child is through verbal communication as well as modeling desired behaviors. Priming is a way of warning or reminding your child before an event or behavior is going to happen. It can be utilized to explain to your child what behaviors are expected. Most importantly, don’t forget to reinforce those positive behaviors when your child adapts to big or small changes that happen.\n\n\nTimers are the easiest tools to utilize, yet the hardest tools to remember. It is a great visual tool (keyword being VISUAL) to help your child stay on task, the transition from a preferred activity to a non-preferred activity, or warn your child when it’s time to give up or share a preferred item. Just like priming, prompting your child ahead of time by utilizing a visual timer, can decrease those power struggles.\n\n 1. How to use a timer \n\nVerbally telling your child how much time is left to complete a task, transitioning to a different task, or giving up a preferred item will help your child adapt to his/her environment more smoothly. For example, set a timer for 30 minutes to eat dinner (the set time can always vary). Prime your child by letting him/her know that they have 30 minutes to eat dinner. Periodically remind your child how much time is left “You have 20 minutes left, 10 minutes left, 5 minutes left, 2 minutes left, 30 seconds, 3,2,1 all done.” During this time it is recommended that the visual timer is displayed within eyesight but out of reach. They can then not only hear the warning prompts but be able to visually see it as well. You are presenting information in which your child is receiving through 2 different senses (seeing and hearing). Since every child reacts differently to visual displays and verbal prompts, don’t be afraid to experiment on how to use a timer. Figure out what works best for your child.\n\n 1. Honoring more time \n\nIs there enough time to honor more time? Is the next activity or task going to be easy or hard for your child? Will honoring more time disrupt others? How many times do you allow more time? These are some questions that can guide you on whether you should allow more time for your child to continue playing. Consider if honoring more time with an activity or item will impede on the next task or event. If it is appropriate and feasible, allow an extra minute or two with an activity or item. Honoring more time can be very effective in decreasing those power struggles. Only allow more time with a preferred activity or item on up 1 or 2 opportunities. If requests continue to persist from your child, provide other options.\n\n 1. Following through \n\nAfter you allow your child to have more time with an activity or item, make sure to follow through with the removal of activity or item, or mentioned above provide other options. Following through sets boundaries and what is expected of your child. As a parent, you do not want to be pushed around by your child and taken advantage of, but you also want to avoid those power struggles. Find a healthy balance between honoring more time and following through when it is time.\n\n 1. Picking your battles \n\nHave you ever heard your child tell you “NO!” when it is time to turn the tv off? All they want to do is keep watching and you are standing there thinking “Oh boy, here comes a power struggle.” It is painful to go through and it usually ends in tears. Pick your battles. Use your priming tools, timers, and follow through to set those boundaries. How can you manipulate the environment in which the battles you pick do not become detrimental to growth and understanding? For example, your timer goes off to get ready for bed. At this point you set the timer, honored more time, and you are ready to follow through. It’s a battle you have to pick. How can you reduce the effort in getting ready for bed? Maybe bring the clothes to your child. Motivate your child to engage in getting ready. When you pick your battles, ease the pain for both the parent and the child.\n\nIn conclusion, utilize a visual timer. Provide prompts while the timer is counting down. Honor more time if time allows. Follow through after you honor more time. Pick your battles. Choose your power struggles wisely and reduce the effort to complete tasks.\n\nPairing- A.K.A. Having Fun! “What is pairing?” you ask. A parent who is the source through which reinforcers are received can become a conditioned reinforcer as a result of the ongoing pairing with other reinforcers. There are highly motivating items and activities that your child loves to engage in. If you engage in those items and activities, there is a chance you become just as reinforcing. This is an opportunity to be able to have fun with your child. The best part, this fun creates instructional control. Instructional control is defined as dealing with the likelihood that presented instructions will lead to the desired behavior. You can finally have relief that playing and engaging with your child will ultimately help your child follow through with certain demands and requests that are placed. Below is an outline of effective ways to establish instructional control.\n\n 1. Enjoy activities they prefer \n\nYour child has certain preferences and fixations. During times you intend to pair, engage in those preferences. It may seem uncomfortable or socially unacceptable, but these are the moments you must cherish most. You do not have to allow it all of the time, but a bit a day goes a long way. Remember, these activities and preferences are your child’s. As mentioned above, it is easy for parents to influence their interests and preferences, but keep in mind your child’s preferences as well.\n\n 1. Remove feasible demands \n\nThis is a time where placing demands should only be acceptable when direct and indirect safety is a concern for himself/herself or others. As mentioned before, pick your battles and provide other options when necessary. Experiment within the environment on how you can keep your child safe such as adding or removing hazardous items around. This limits certain demands. Some examples are “Don’t touch the outlet (cover the outlet), turn the water off (have a timer on outside water), leave your sibling alone (remove the sibling).” These simple adjustments within the environment help eliminate verbal demands on your child.\n\n 1. Take a deep breath and allow your child to explore in a safe environment. \n\nTake a deep breath. As a parent, you have earned to relax and feel proud. Your love and a continuous search to help improve your child’s quality of life is so appreciated and respected. This is a time to allow your child to explore the way you have explored to improve their journey. Limiting restrictions in their independent play will allow them to search and manipulate their surroundings. Always keep your child safe, but allow exploration and independence (of course with guidance) into your child’s life and you will see improvements day by day.\n\nIn conclusion, pair with your child by enjoying activities they prefer, remove feasible demands, and take a deep breath and allow your child to explore in a safe environment. Pairing with your child and building positive rapport will allow instructional control in the future in which your child will follow easy and sometimes difficult demands that are placed. Pair throughout the day when possible. Don’t forget to take a deep breath and stay positive because you rock as a parent!\n\nTo Wrap it All Up \n\nAn antecedent is an environmental condition or stimulus change that occurs prior to a behavior. Antecedent interventions are strategies that are implemented before a behavior happens. This can influence (increase or decrease) the likelihood of a specific behavior. These antecedents are environmental factors in which your 5 senses have the ability to take in.\n\nEase your mind and know that these power tools are here to help with the day-to-day power struggles with your child. Preference/choice, priming, timers, and pairing are tools for you to utilize to decrease those power struggles. Experiment with these tools by integrating them simultaneously. For example, providing choices when your timer runs out, prime to warn your child when the time has expired, honor extra time, and always follow through. Most importantly, Don’t forget to pair (play) with your child whenever you can. There isn’t a one size fits all. Figure out what works best for your child while applying these simple tools.\n\nAlexandra Hakeem Is a Denver based BCBA. In her free time, Alexandra enjoys snowboarding, volunteer work, and hanging out with her nieces and nephews.", "pred_label": "__label__1", "pred_score_pos": 0.659865140914917} {"content": "Immune Boosting Tea\n\nToday I worked with a client whose immune system was compromised by stress. Serious Stress. We are taking an 8 on a 1 to 10 scale. As I was putting her protocol together I realized that many people think of the immune system as the first line of defense against invasive critters like bacteria and viruses. This is true; your immune system is the number one factor that keeps you healthy when everyone around you is getting sick.\nWhat many people don’t know, are the many factors that can affect the immune system adversely and how the immune system affects the rest of the body. So, before we get to this fabulous Immune Boosting Tea recipe I created for her, let’s take a look at what you can do to optimize the conditions for your immune system to thrive.\n\nFactors Affecting the Immune System\n\nThe health of your immune system is in direct proportion to what you put into your mouth. A diet rich in whole foods, such as vegetables, fruits, nuts, seeds, animal proteins and quality fats are key to maintaining the health of your immune system. Eating processed food, sugar, fast food, and other man made or synthetic foods are nutrient depleting, and leave the body without the nutrients it needs to heal itself.\nIf you are suffering from chronic or long term stress you are at risk for high blood pressure, heart disease, digestive problems, autoimmune conditions, and a weekend immune system. Stress increases cortisol in your body, which suppresses inflammation during a response to stress. However, if it is present in your blood for prolonged periods of time, your body develops a resistance to cortisol and doesn’t respond to it properly. Instead, it can ramp up production of substances that actually promote inflammation. These pro-inflammation substances are associated with chronic inflammatory and autoimmune conditions such as fibromyalgia, rheumatoid arthritis, lupus, Crones disease, Irritable bowel, diabetes, heart disease and even cancer. Get rid of as much stress in your life as possible and offset the stress you do have with plenty or rest, relaxation, and meditation.\nSleep Deprivation\nFailing to get enough sleep decreases your body’s production of important T cells. A T cells is a lymphocyte that actively participates in the immune response. In simple terms, sleep deprivation suppresses immune system function. The more 60 hour work weeks you pull with limited sleep and recovery time, the more likely you are to decrease your body’s ability to respond to colds or bacterial infections. Support your immune system by getting plenty of rest and prioritizing sleep.\nPhysical Inactivity\nExercise increases circulation and removes toxins from your body. It also helps flush bacteria out of the lungs and airways. This may reduce your chance of getting a cold, flu, or other illness. Exercise can also increase the production of antibodies and white blood cells (WBC). WBCs are the body's immune system cells that fight disease. When you don’t move, fluids and toxins stagnate, creating the perfect environment for disease. Find an enjoyable way to move vigorously daily.\nVitamin D Deficiency\nVitamin D is essential to your body's immune system because it helps immune cells make new antibodies. It’s absolutely incredible how fast adequate levels of vitamin D can be restored by sunlight. The human skin produces approximately 10,000 IU of vitamin D in response to 10-30 minutes of summer sun exposure. That’s more than 16 times your daily requirement for vitamin D. Even better, six days of 10-30 minutes of sunlight exposure, without sunscreen, can make up for forty-nine days of no sunlight exposure. As your skin gets darker, it produces less vitamin D and you can stay out longer without burning. Sunning yourself for 10-30 minutes is generally recognized as a safe way to obtain more than adequate amounts of vitamin D.\nGut Health\nThe microorganisms inside your body and intestinal tract make up what is called your Microbiome. You depend on a vast army of microbes to protect you against germs, break down your food, and produce vitamins. Gut health is directly linked to your immune system. Things that can destroy your gut's natural balance and lower immune system function are:\n\n • An unhealthy diet (fast foods, processed foods, sugar, pesticides, and genetically modified foods)\n • Taking antibiotics\n • Stress\n\nTaking probiotics daily can have a significant healthy impact on your Microbiome.\nCertain immune boosting herbal teas can also help support and improve your immune systems ability to deal.\n\nHerbal Immune Boosting Tea\n\nNow, on to this fabulous recipe!\nThe ingredients used in this recipe are combined synergistically, supporting, enhancing and working together for maximum immune benefit. This immune boosting tea recipe can support and strengthen your immune system and empower your immune system to stay strong in the face of any encounter.\n1 part elderberries\n1 part echinacea herb\n1 part eleuthero root\n1 part astragalus root\n1 part peppermint leaf\n1 part rose hips\n½ part cats claw\n½ part nettle leaf\n½ part hibiscus flowers\nMeasure and purchase the parts of each of the herbs listed by volume not weight. Combine all ingredients in a large bowl until well combined. Store in a glass jar with tight fitting lid and store in a cool dry location. Will keep in a cool, dark place for approximately 6-8 months.\nTo Brew\nUsing a tea ball, use 1 teaspoon of Immune Boosting Tea per 1 cup of hot water and steep for at least 20 minutes or overnight for a more potent herbal infusion. Loose tea may be brewed using a French press. For larger batches or iced tea, combine loose tea in a large pot of boiling water. Turn off heat and steep for 30 minutes or longer for a stronger infusion. Cool then refrigerate for iced tea.\nWhere to Find the Ingredients\nEchinacea purpurea herb:\nEleuthero root:\nAstragalus root:\nPeppermint leaf:\nRose hips:\nCats claw:\nNettle leaf:\nHibiscus flowers:\nMore About These Herbs\nElderberries – These are very efficient at inhibiting influenza, herpes, and bacterial infections. Elderberries are known for their outstanding ability to ward off and cure the common cold and/or flu virus and are perfect for this immune boosting tea recipe. Elderberries are rich in antioxidants and have proven to be more effective at fighting the flu than Tamiflu. In one study published in the Journal of International Medical Research, 90% of Norwegian influenza patients who took the elderberry extract were free of the flu virus within three days, compared to six days for the control group who took placebos.\nEchinacea – Native American populations have used Echinacea for generations as a powerful natural antibiotic and immune booster. Echinacea helps speed up healing and is naturally antibacterial and anti-fungal.\nEleuthero root – A powerful adaptogen and tonic herb, eleuthero helps the body properly respond to stress. This is a great herb to support the immune system. It is also known as Siberian Ginseng. Eleuthero is a gentle, yet powerful herb, which is why research suggests it’s the safest and most efficient immune-stimulant available for children and is perfect for any immune boosting tea recipe.\nAstragalus Root – Boosts and supports healthy immune function and offers protection against viral infections. Astragalus is considered an immune boosting “super herb” that aids in adrenal gland function and strengthens the digestive system. Studies in the US have shown Astragalus to boost cancer patient’s immune system during and after radiation therapy.\nPeppermint Leaf – Due to its powerful antifungal, antibacterial and antiviral agents, peppermint oil is commonly used for those with low immune systems and immune disorders. Peppermint also enhances the flavor of this immune boosting tea, making it more enjoyable and easy to ingest.\nRosehips – A rich source of vitamin C and bioflavonoids, rosehips help the body by boosting the immune system and shortening the duration of an illness. Rosehips also give a yummy flavor to any immune boosting tea blend.\nCats Claw – Boosts Immune Health. Animal and human studies suggest that, in addition to exhibiting powerful antioxidant and anti-inflammatory effects, cat's claw naturally boosts the immune system, strengthening its defenses against the multitude of pathogens encountered each day in the air, water, and environment.\nNettle leaf – Nettle is a nutritive herb rich in vitamins and minerals and is great for nourishing and supporting the immune system during times of stress. Nettle stimulates the lymph system to help the body stay hydrated, boost the immune system, and remove toxins.\nHibiscus flowers –The high amount of vitamin C in hibiscus tea is considered a great immune system booster, and it can help prevent against colds and the flu and enhances the flavor of any tea blend.\n*Always check with your physician before using any herbal tea to stimulate your immune system.\n\nLeave a Reply\n\n\nRelated Articles\n", "pred_label": "__label__1", "pred_score_pos": 0.6134481430053711} {"content": "Home>Questions>Why is the expense ratio of direct funds lower?\n\nWhy is the expense ratio of direct funds lower?\n\nIn the same mutual fund scheme, the expense ratio is lower in case of the direct scheme. What makes the regular scheme's expense ratio more?\n\nMridul Agrawal\n\nMutual fund schemes are usually categorized into - Direct and Regular Plans.\n\nBoth these plans are exactly same, as in they are run by the same fund managers. The funds in both the plans are invested in the same stocks and bonds, making the portfolio essentially the same.\n\nThe difference lies in the fact that direct mutual funds charge no broker/distributor commission and other charges.\n\nOn the other hand, regular mutual fund schemes charge broker or intermediary fees or commission. This is because usually mutual funds have been sold through brokers and intermediaries.\n\nThis commission is added to the expense ratio of the fund making it more expensive than the direct plan.\n\nThe commission usually amounts to 1% – 1.25% per year.The difference can be observed in the NAV and returns of the 2 plans.\n\nIt must be noted that expense ratio of a fund contains expenses like the fund management fees (mostly, fund managers salary) which is present in both direct and regular plans. Over this, regular plans also charge broker fees.\n\nTherefore, all things remaining same, it is safe to say that in a direct plan, investors gain higher returns vis-à-vis regular plan, due to lower expense ratio. You can read more here.\n\nHarsh Jain\n\nThe expense ratio of any mutual fund consists of these broad categories: distribution charges, securities transaction fees, management fee, investors transaction fees and fund services charges.\n\nIn case of direct mutual funds, the expense ratio does not include the distributions charges. This results in the expense ratio being much lower.\n\nFor example, the expense ratio of SBI Bluechip Fund (Regular) is 1.97%. But for SBI Bluechip Fund (Direct), the expense ratio is only 1.15%.\n\nThis can result in big differences in returns over a long period of time.\n\nThe returns received from direct plans will always be higher than the returns received from the regular plan of the same mutual fund.\n\nNew to Mutual Funds?\nStart exploring mutual funds to begin your investment journey\nHave a SIP!\nStart and manage monthly investments on Groww, simple and fast", "pred_label": "__label__1", "pred_score_pos": 0.9999088048934937} {"content": "Phillip Patrick\n\nThe end goal is always a motivator, but if you don’t enjoy the journey, don’t bother as the climb will encompass infinitely more of your time than reaching the peak.\n\n\nPhillip Patrick is an aspiring technology entrepreneur and 2012 graduate from the University of South Carolina. He has spent the past 5 years attaining the highest honors awarded as a President’s Club member at Fortune 1000 (#653) technology distributor, ScanSource, Inc. He began developing Emerge Inc in the summer of 2016 after initially starting it during his final year of school with the help of co-founder Sean Strub. The pair went on to vet and become graduates of the 2nd Greenville, South Carolina cohort of the renowned international entrepreneurial incubator, Founder Institute, a 4-month facilitator designed to build profitable and enduring companies of various types.\n\nWhere did the idea for Emerge Inc. come from?\n\nEmerge truly started as an idea from the exposure (or lack thereof) of my own recruiting process throughout high school. I had originally committed to play collegiate soccer at Wofford but was forced to pivot in the very late stages after becoming an early enrollee. From that point, there was no real solution to in a short timeframe, expose myself in a way that would truly help me further my soccer career. I went on to play for two years at Spartanburg Methodist College, a junior college power while planning my next moves. As I “burned out” somewhat on my sport at that point, I transitioned into the University of South Carolina (Columbia) where the “pool” of people I met and talent grew infinitely larger from being a state flagship school. Hearing the stories of players who I befriended and their missed opportunities or lack thereof cause me to begin investigating the holes that seemed to litter the recruiting process.\n\n\nA typical day for myself, especially at this stage, is a true “work day” following the 8-5 type of mold. In developing a company, there is never a shortage of things to do, so the first portion of my day is usually around planning in order for us to operate at a high level and not “get lost in the weeds” if you will. It becomes the balance of polish versus progress.\n\nHow do you bring ideas to life?\n\nThe only way to bring anything to life is through action and structure. The greatest inhibitor of most people executing their dreams typically is themselves. As Antoine De Saint-Expuery said, “A goal without a plan is just a wish.” The world is never short on brilliance or great ideas, but few ever proceed to give themselves the structure or planning to move them forward.\n\nWhat’s one trend that excites you?\n\nI personally am very interested and very captivated by all things AI presently. MIT announcing their 1-Billion-dollar investment into an AI university only will propel this growing trend and its uses from day to day to commercial in the coming future. If you have not had the opportunity to work or train AI, even if in a very limited capacity, I encourage you to find a member who could let you tinker so to speak. From projections to dialogue to suggestive selling to data management, the possibilities are only limited to what a person can think to teach it. How people will continue to weave its functionality into the IOT should prove for an extremely interesting next couple of years on the technology front.\n\n\nREAD! Or listen to audio books. It is so easy to get lost in the day to day life presented to many of us now. The entrepreneurial spirit is based around innovation. Things that haven’t been done. Something you would have to explain or teach to another person. Just because a person becomes a “teacher” in something, doesn’t mean they ever should stop learning. Books are our greatest teacher. Someone else’s words, thoughts, experiences that you personally have never seen as they are unique to another. Part of separation or “escalation” if that is your concern in the world, is having a better understanding of it. You can’t teach who you don’t know and you can’t grow if you are concerned with only teaching. My greatest habit isn’t anything unique to me. It isn’t something that makes me special. I just still want to read. To learn. To grow.\n\nWhat advice would you give your younger self?\n\nI would advise my younger self and my current self to remember to have patience in progress. I am wired so that I prefer to do things, do them now, and do them well. Simple enough. Realistically, now is not always feasible, but that doesn’t mean you aren’t progressing. They say patience is a virtue and one that I still need to continue polishing as I age. Freight trucks don’t turn on a dime. Rome wasn’t built in a day. And ultimately, successful companies are not built overnight. The end goal is always a motivator, but if you don’t enjoy the journey, don’t bother as the climb will encompass infinitely more of your time than reaching the peak.\n\n\nYou are better off compartmentalizing out tasks at a time rather than multitasking. While I personally pride myself as a strong multitasker, I have quickly learned that spreading yourself thin amongst tasks caused the product to suffer and anxiety to rise.\n\n\nRemind yourself of why you started. It is easy to get lost inside tasks, motivations, and thoughts on your journey of developing a company. One of the better phrases I was ever told was that “if your why matters enough, how will never matter.” The impossible becomes possible. The difficult becomes feasible. Dreams become reality and progress is ultimately made.\n\nWhat is one strategy that has helped you grow your business?\n\nHorde talent. That is something that we have been able to do in spades when we began assembling our core team. One of our greatest strengths is the diversification in skillsets available to us. From marketing gurus to business savvy negotiators, to highly spoken of veterans of the industry, to developers, to financial analysts. We have piecemealed and incredibly eclectic group, but due to our diversification, we are lethal in being able to handle most situations without relying on third parties. I always believed that if you are the smartest person in the room (or even feel that way), it is time to find a new room. Fortunately, at Emerge, we actively poach some of the top talent available and protect it to make us a very disruptive and dangerous up-and-comer in the space.\n\n\nWhen Sean and myself originally started Emerge, we were thrusting ourselves as, in the eyes of corporate America, two youths attempting to break into a multi-billion dollar industry. Needless to say, skepticism reigns supreme until you truly are able to display your merit, a tall ask in a startup company. We really first encountered such when we decided to run the concept through famed incubator the Founder Institute ( For those unfamiliar, think of a high-level MBA program centered around developing an entrepreneurial idea and validating the concept. While they took us under their wing, our initial presentations in the eyes of high-level minds we were not prepared for the “big time stage” quite yet. To have different styles of thinking tear up the idea in places that you had thoroughly believed in was incredibly tough. It became a lesson in managing expectations, stomaching pride, broadening horizons, accepting critical feedback and embracing the need at times to pivot slightly. All of which became lessons that we carried right through “graduation” as part of the second cohort to be hosted out of Greenville, South Carolina.\n\n\nSince everyone is on the recurring revenue train of thought these days, I will throw a penny into that bucket. Presently, for the large metropolitan cities (New York City, Chicago, etc). Approach the respective city to purchase their legacy and existing phone booths. These are a dead technology that many will be quick to part with as their “value” is seen as a spot for marketing at best. I encourage you to buy a batch of them and then proceed to install a wireless access point of your choice (Ubiquiti is the most affordable commercial at a consumer price) underneath the booth itself. This allows you to purchase an indoor rated access point as it is secured and protected by the overhang of the booth. The phone booths themselves are already wired from their legacy job as a true phone so no infrastructure needs to be laid down. From there, you can “plug them in” and sell the wireless network given off for public use back to the respective city, ultimately paying yourself off relatively quickly with future recurring revenue ahead.\n\n\nThis one is tied a little more to taking advantage of a scenario. Once upon a time prior to a craze, there was a currency being developed called Bitcoin. While the craze took the nation by storm, early enough in the game, I threw just over 100 dollars into it. From there I was fortunate enough to watch the craze and demand unfold as the value multiplied and partially began helping fund Emerge.\n\n\nI will confess, I am a big fan of Grammarly. For those of you who don’t know, it is a program purchased (premium version) that is embedded on your device and runs in the background. It serves as the ultimate grammatical corrective and instructive tool. Not only does it assist in polishing anything you work within (browsers, programs, outlook, etc), but the AI takes it a step further with a suggestive measure to take such as, “this was spoken passively and may ultimately detract from your message through a lack of confidence. Consider ____”. While not everything is ideal, for those who “live” within their email, it is fabulous as it allows at times for the emotional reader/responder to be monitored somewhat and allow for that second opinion on whether something is truly beneficial to send or not.\n\n\nI encourage everyone to read “Rich Dad Poor Dad” by Robert T. Kyosaki. While there are numerous lessons to be learned from this book ranging from understanding choices in life to reinforcing the education doesn’t end at school, one of the greatest things an entrepreneur can pick up is the art of mastering your emotions when you are dealing with money. People are as prideful, possessive, interested and defensive of their money as anything in this world. This book allows you to begin to analyze different solutions rather than let the emotions that stem from your financial situation drive you. I believe this to be an important lesson for any up and comer or entrepreneur as money management in the infant stages of any company is absolutely critical. It is tough to make a million dollars overnight, but you can certainly set yourself back a million dollars.\n\nWhat is your favorite quote?\n\n\nKey Learnings:\n\n • It will never be overstated enough, but patience is a virtue.\n • Even after school, you never stop or should seek to stop being a “student”.\n • If you don’t enjoy the process, then stop now. You reap what you sew, but many people don’t enjoy the sewing process. 90% of the company will be in the “building” stages so you cannot afford to dislike that portion.\n • Compartmentalize tasks, for increased efficiencies.\n • Never forget your “why”.", "pred_label": "__label__1", "pred_score_pos": 0.6168487071990967} {"content": "< Back\n\nShare |\n\nBlockchain – the biggest thing since the internet?\n\nDistributed ledger technology, or blockchain, is best known as the technology which underpins Bitcoin, the world's most successful cryptocurrency to date. Initially treated with some scepticism as a niche application, it is fast becoming viewed as the most disruptive technology in decades. Beyond its obvious applications in financial services, government services, smart contracts and cybersecurity, it could fundamentally change the way society operates. No wonder that governments are desperate to get ahead of the curve and, quite literally, harness its potential.\n\nMarch 2016\n\nWhat is blockchain?\n\nThe terms 'block chain', 'blockchain' and 'distributed ledger technology' (DLT), are used more or less interchangeably. The technology provides a way of creating a shared ledger or database which can record and track transactions and assets. Each participant sees the identical copy of the ledger in close to real time.\n\nThe rules built into the system determine what constitutes a transaction. Transactions are passed around nodes. Records of transactions are aggregated into blocks by 'miners' once the transactions have been verified by using computational power to assure all members of the network that the transaction has taken place according to the system's rules. The purpose of mining is to allow nodes to reach a consensus about the validity of the transaction. In theory, anyone with a computer can become a miner by installing some software but the processing power required to crack the code in order to add a new block to the chain is enormous. Small- time miners will often pool together but some miners take the form of large data centres. Incentive to become a miner is usually provided; Bitcoin rewards its miners with (unsurprisingly) Bitcoins.\n\nOnce a consensus has been reached about the transactions in a block, it can be linked to another block by a 'chain' using a cryptographic signature. A new block can only be added to the chain once the transactions are authenticated and the cryptographic puzzle in the previous block has been solved in order to link the new block to it.\n\n\nResilience to fraud is one of the technology's main features. Anyone attempting to alter a ledger would have to redo all the calculations carried out to add the transaction in question to the blockchain. They would also have to redo all the calculations for the blocks which followed and then be the first to crack the newest block and have it accepted into the chain. For the moment, at least, this is thought to be impossible. To alter the Bitcoin system, for example, it is estimated you would need to control 51% of the computing power of the miners of the system. Having said that, Bitcoin miners are already reportedly suffering from cyberattacks which are putting pressure on current systems.\n\nDistributed ledgers are shared but no single user controls them. Participants in the ledger keep it up to date and can only amend it according to the pre-programmed rules of the system and with the consensus of at least some of its other users. This means that the ledgers can be both public and secure. A distributed ledger can be permissioned which means a single or a select group owns it and verification is carried out by a limited pool of consensus providers. It is also possible to create hybrid ledgers so you could have a blockchain ledger as an underlying database with top layers of permissions for different types of users. Alternatively, the ledger can be unpermissioned like the Bitcoin ledger. It is open source, anyone can contribute to it and nobody can prevent a block being added once consensus has been reached.\n\n\nThe distinction between permissioned and unpermissioned ledgers is likely to be a crucial one in the development and practical application of blockchain technology. The key strengths of blockchain are that its ledgers are a shared but secure record of transactions and ownership which updates more or less in real time and which shows a complete history. The Bitcoin ledger, for example, shows every single Bitcoin transaction which has ever taken place.\n\nThe capacity to do away with the need for intermediaries is one of the greatest attractions of distributed ledgers. Because all transactions are verified before they are added to the chain, there is far less need for a central trusted third party or a central bureaucracy to facilitate operations. In addition, other information beyond the details of the transaction can be added so that, for example, it is not merely an event which is recorded but details of ownership or other personal records. With permissioned ledgers, all participants start off as trusted users which reduces the need for sophisticated mining.\n\nThe decentralised control of unpermissioned ledgers makes them particularly resilient to cyber attack and the potential for pseudonymisation (if not anonymisation) of players provides inbuilt data protection. Both these aspects can be strengthened or weakened depending on the nature of the ledger and its permissions. One of the benefits of blockchain technology, especially when combined with other database technology, is the high degree of control it offers users. For example, an individual could give data to HMRC and various other government agencies but the individual could control which data could be seen by which agency and would also be able to track access to and use of that data. For more on data protection and cybersecurity issues, see our article.\n\n\nFinance - The most obvious applications are in the world of financial services (which we discuss in more detail in our article. The appeal of a ledger which cannot be manipulated or unlawfully altered to record financial transactions is easy to see and the reduced administrative cost associated with genuinely digitised banking is proving very attractive to banks. Leading banks are collaborating in R3 CEV, a joint venture aimed at developing standardised private ledgers to be used in the banking industry and trials have already started.\n\nGovernment - Government is looking at a range of applications for blockchain technology, particularly with a view to reducing bureaucracy. The means for government agencies to securely share information across departments is enticing. Welfare distribution, healthcare, tax collection, contract management, property ownership, reduction of fraud, protection of critical infrastructure and distribution and control of international aid, are all highlighted by the UK government as areas which would benefit from the use of distributed ledgers. In addition, they offer the potential for a more inclusive form of government, whereby individuals could vote more frequently or give voting instructions to local MPs in an easily transmittable and recordable manner.\n\nSmart contracts - It is not just in government that the use of so-called 'smart contracts' is being explored. Blockchain technology offers the possibility of using smart contracts across the whole range of businesses. Ethereum, for example, is a start up whose distributed ledger can carry more data than the Bitcoin one. It allows users to create relatively sophisticated smart contracts, for example, invoices which pay themselves when a product arrives, or share certificates which distribute dividends to shareholders automatically when profits reach a certain level.\n\nAsset tracking - While blockchain technology started off with a somewhat shady reputation, with Bitcoin viewed as a payment mechanism for criminal activities, blockchain technology actually provides huge potential to reduce fraud and track provenance. Assets like art and jewellery are traditionally tracked manually with paper documents used to prove origin. Both the artefacts and the records are open to forgery. Blockchain offers the means for higher forms of verification and tracking. Everledger is a leading example of using blockchain technology to track assets, in this case, diamonds. It creates an electronic identify for each diamond, assigns it a digital passport and then attaches that data to the transaction records held in the blockchain. Asset tracking and sharing is also potentially useful for tracking and managing the internet of things with the particular benefit that doing so in a distributed ledger, rather than through centralised databases, is likely to protect from hacking and surveillance.\n\n\nNotwithstanding the exciting potential of blockchain, there are some considerable deficiencies in the blockchain technology at the moment which include the fact that it relies on huge processing power and can only cope with a limited number of transactions per hour (seven Bitcoin transactions per second, compared with 1736 transactions processed by Visa America per second). As with any technology, there is the risk that it could be expensive to implement and that it could quickly become obsolete or incompatible with other technologies, especially if there is no agreement over which standards to use. If a standard is agreed or becomes the front runner, the controller of the standard could wield a vast amount of power. Another concern is what happens if consensus breaks down, particularly with unpermissioned ledgers. The controllers of Bitcoin are reportedly already in disagreement about how to reach consensus.\n\nAn overriding issue is how to regulate the use of blockchain. Governments see a threat in unpermissioned distributed ledgers which are not centrally controlled and are trying to work out how to control their use without stifling innovation (see our article for more information). In the UK government's recent report \"Distributed Ledger Technology: beyond blockchain\", an entire section is dedicated to the disruptive potential of the technology: \"DLTs pose a threat to any hierarchical structure through an ability to connect and operate in a distributed network, without trusted or necessary intermediaries, by replacing top-down control with consensus. Hierarchies can have significant disadvantages…but do offer advantages wherever a neutral broker is needed; and, for example, in representative democracy…The challenge will be to ensure that DLT and its associated innovations are directed towards a connected productive society within a supportive infrastructure.\"\n\nAt the moment, democracies create their rules through a legislative process. These rules are interpreted and enforced by people. Blockchain technology allows for people to be replaced by programming. For the foreseeable future, the programming will still need to be carried out by people but not necessarily by elected representatives. Bitcoin, for example, is controlled by a handful of people who developed the technology and the product. Governments are looking not only to harness the potential of the technology but also to control it without stifling it. For libertarians, a world in which control is taken away from centralised power structures is a thrilling one, but others are worried by the vision of a future in which ever more sophisticated computer programmes have the final say.\n\nMuch will depend on getting the balance between control and openness right, with permissioned ledgers likely to be favoured by many. Despite some significant shortcomings including the processing power needed for blockchain ledgers and the current, relatively slow transaction rate, there can be no doubting the potential of this technology across financial services, business and government. Perhaps though, at the very heart of the matter is a philosophical debate about how society should function. Who makes the rules? Who controls the infrastructure? Who can play the system? While distrust of central government is prevalent across the world, whether in developed or developing nations, and a lot of people would cheer the demise of bankers and lawyers as intermediaries, perhaps what the debate actually boils down to is: who do you trust more - Man or Machine?\n\nIf you have any questions on this article please contact us.\n\nBlockchain – the biggest thing since the internet?\nAdam Rendle\n\nDebbie looks at the disruptive potential of blockchain technology.\n\n\"At the very heart of the matter is a philosophical debate about how society should function. Who makes the rules? Who controls the infrastructure? Perhaps what the debate actually boils down to is: who do you trust more - Man or Machine?\"", "pred_label": "__label__1", "pred_score_pos": 0.5578190684318542} {"content": "Question: Does Everyone Have A Genetic Mutation?\n\nWhat is the difference between a nonsense and a silent mutation?\n\n\nNonsense mutations produce truncated and frequently nonfunctional proteins..\n\nAre mutations always bad?\n\nA mutation is a change in the genetic material of an organism. … Mutations are rarely harmful though. Indeed, most mutations go unnoticed, as the body has mechanisms to stop a cell copying itself when a mutation occurs. Sometimes mutations can even benefit organisms and promote diversity in a species.\n\nWhat percentage of the population has a genetic disorder?\n\n\nWhat are 3 causes of mutations?\n\n\nHow common are genetic mutations?\n\n\nWhat are some genetic mutations?\n\n\nWhat happens if mutations are not corrected?\n\n\nWhich mutation is not hereditary?\n\nSomatic mutation Somatic mutations are not inherited by an organism’s offspring because they do not affect the germline. However, they are passed down to all the progeny of a mutated cell within the same organism during mitosis.\n\nWhat is the most common genetic mutation?\n\n\nWhat are the 2 main types of mutations?\n\nTwo major categories of mutations are germline mutations and somatic mutations.Germline mutations occur in gametes. These mutations are especially significant because they can be transmitted to offspring and every cell in the offspring will have the mutation.Somatic mutations occur in other cells of the body.\n\nDoes stress change your DNA?\n\nOur studies and those of many other researchers around the world have shown that early life stress alters how DNA is packaged, which makes cells function differently than their original mandate.\n\nAre all mutations genetic?\n\n\nHow do you identify DNA mutations?\n\nSingle base pair mutations can be identified by any of the following methods: Direct sequencing, which involves identifying each individual base pair, in sequence, and comparing the sequence to that of the normal gene.\n\nWhat are the 4 types of mutation?\n", "pred_label": "__label__1", "pred_score_pos": 0.9976488351821899} {"content": "Simulating Electroplating using CFD-ACE+\n\n\nby Abraham Meganathan on 23 Apr 2014\nElectroplating is the oldest industrial application of electrochemical reactions where metals or alloys from metallic ions in electrolytes are deposited on a substrate. Plating enables engineers to tailor a deposit’s mechanical, electrical and magnetic properties and resistance to corrosion. Electroplating has significant applications in present day industry, ranging from microelectronics to metallurgy. Global competitive pressure has caused the microelectronic manufacturers to develop high yield cost effective devices using electrochemical processes. Electrochemical methods are used to create thin- and thick-film-patterned microstructure.", "pred_label": "__label__1", "pred_score_pos": 0.9918065667152405} {"content": "Vaginal steam contraindications. Are vaginal steams safe?\n\nVaginal steam contraindications - Sayoni Care\n\nDifferent approaches and point of views are everywhere. Let us see what Ayurveda has to say about his subject. Are there any Vaginal steam contraindications?\n\nThis beautiful ancient practice is safe when respecting below important points:\n\n1- If you carry any contraceptive device in place or IUD\n\nIt is a fact that the steam opens the channels. This leads to the possibility that the device could move a bit out of its place, which can create discomfort afterward. The warmth can heat it up creating a burning sensation in case of metals or what it’s worse, creating a chemical reaction which will be absorbed by the walls of your uterus. If you have decided to use this method please do not risk it.\n\n2- During pregnancy or if there is any possibility of pregnancy\n\nDuring pregnancy, any kind of cleansing therapy is contraindicated. This is due to vaginal steam practices are supporting the detox process from your reproductive system. The body needs rich nourishment, and rejuvenation so the baby can get the most of the nutrients at the body temperature. You do not want to interfere with the fetus development.\n\npregnant belly vaginal steams-safe-contraindications Sayoni Care\n\n3- In case of any open cuts/ wounds/stitches or during a herpes outbreak\n\nGive your body a sweet little break and time to heal, fresh wounds and stitches can easily break or open with the warmth. In the case of post-partum, certain preparations are suitable, wait at least for 9 to 10 days or until your midwife gives you the green card. Ayurveda has a whole protocol for this period, after abhyanga (external oleation) for three days, warm herbal decoctions are given with Vata pacifying herbs, which can be applied on the abdomen and genitals. Another option is a prolonged tub bath. After these 3 days, considering the season and constitution, Nadi svedana or Pinda Sweda could be recommended. From 2 weeks to 45 days if possible. After the steaming (svedana) or bathing, they practice fumigation.\n\n4- During the heavy bleeding days of the period\n\nThe warmth makes the blood more liquid in texture, speeding up the flow. If you are already bleeding enough there is no need to speed up the natural process which might lead to stressing the body and a possible hemorrhage. The heavy days you should rest, let the body do their job. When the obstruction is there this practice is recommended at least twice a month, during the ovulation phase and just before your period start, in order to assist the body.\n\n\n5- If you are dealing with Pitta dosha imbalances especially during summer\n\nAyurveda recognizes 3 types of constitutions (dosha imbalances, Vata, Pitta, Kapha) that when are mixed between them, create a total of seven different types. In order to make your life a bit easier and understand better these concepts, we have created a section called Ayurveda which can help you to identify the attributes in which your constitution can fit in. It will give you also more insight into how the elements place a role in our body. Our current dosha, might varies from time to time, since we are in constant change and influenced by the food that we ingest, the climate, the season, the age, etc. Pitta is governed by the fire and water element.\n\nAyurveda considers that any kind of Svedana therapy (sweating) like steaming is not recommended for pitta constitutions with imbalances especially during the hottest months of the year. Does it make sense? What happens when we add fire to more fire? In a holistic approach, we should consider the interrelationships between the unique individual characteristics and all the surroundings. These women (along the rest of the year) should avoid very high temperatures since the fire element is very present in them. A bit more cooling herbs in a gentle way, using mild temperature for yoni steam practice, during coldest months is much more suitable and beneficial for Pitta when they are not out of balance. In case of imbalance, they can wash with cold decoctions or herbal infusions, with herbs that support their restoration.\n\n6- In case of concrete healthy issue, double check it\n\nConsult a health practitioner before using herbals steams. In the case of pre-existing medical conditions or contraindications with other medications, please make sure to follow your health practitioner advice.\n\nFollowing this points, this practice is very safe. We hope that you feel confident to try them out and get the best out of all the amazing benefits behind. It is always good to get informed well before we start.\n\nCheck our vaginal steam recipes here!\n\nBig long hug to all the sister in the globe!\n\nSayoni Care\n\nSubscribe to our newsletter\n* we never share your e-mail with third parties.", "pred_label": "__label__1", "pred_score_pos": 0.8676071166992188} {"content": "The state and regional coronavirus guidelines are designed to keep public spaces empty and help residents self-isolate.\n\nJames Martin/CNET\n\n\nThe project of reopening the economy has begun. The surge of COVID-19 infections has begun to slow in many parts of the country, prompting state and local governments to loosen lockdown restrictions and allow businesses to gradually reopen, as long as they continue to take steps to check the spread of the disease. Which businesses open and when may vary significantly depending on where you live, but one truism everywhere in the world is that lockdown restrictions aren’t lifting all at once.\n\nAs the curve of daily cases begins to flatten in some parts of the country, government and public health officials are working on plans for how to return society and the US economy to “normal”, all of which take a multiphased approach to relaxing some rules while keeping others — particularly the use of face masks — intact. For example, the Centers for Disease Control and Prevention issued guidelines this week on reopening schools, factories and other businesses. The recommendations reinforce the path set out by the White House and Johns Hopkins University.\n\nThe purpose of reopening society slowly is to keep from triggering a second wave of the coronavirus, which some experts say could still come. Here’s what all the phases mean for you and your city.\n\nRead more: Where you can buy a face mask online right now\n\nPhase 1: Slow the coronavirus spread\n\nIn many parts of the US, this is the phase many residents are now coming out of, with social distancing and stay-at-home orders keeping most people indoors except for essential trips to the store and recreational walks. \n\nIn this first phase, nonessential businesses and activities such shopping malls, theaters, sporting events, hair salons, barber shops and casinos have been shut down. Businesses that provide essential health and safety services have stayed open, including grocery and hardware stores, pharmacies, hospitals, medical centers, banks and gas stations. \n\nNow playing:\nWatch this:\n\nCoronavirus lockdown: Why social distancing saves lives\n\n\nRestaurants — as well as pubs and bars in states such as New Jersey — are considered essential, but require you to pick up your order or have it delivered instead of sitting down to eat.\n\nWhile outdoors, residents are required to avoid large groups, practice social distancing and, in some regions, are mandated to wear protective face masks.\n\nPhase 2: Lockdown begins to lift\n\nThis is the phase many states are transitioning into. The US government, working with public health advisers, suggests that quarantine restrictions can begin to ease after:\n\n • The number of daily cases steadily drops for at least two weeks.\n • Hospitals and medical centers can operate outside of crisis mode to care for all COVID-19 patients.\n • Coronavirus testing becomes widely available for at-risk healthcare workers.\n\nCalifornia has loosened restrictions on construction and certain DMV operations and reopened parking lots for state parks. The state is also looking at how professional sports events can return this summer.\n\nSome states — including New York — could wait for more safeguards, such as widespread testing for anyone with symptoms, to fall into place. Contact tracing could be another big component for some states, to quickly find people who have come into contact with an infected person, and self-isolate.\n\nStates in Phase 2 are starting to open businesses that are considered low-risk for spread of the virus, such as garden supply stores, construction sites and manufacturing locations. To return to work and school, expect social distancing requirements indoors (for example, keeping desks six feet apart) and potentially temperature checks as part of the condition of entering a building or classroom.\n\nThe most vulnerable people, including older people and those with underlying conditions, may still be required or encouraged to shelter in place.\n\nPhase 3: Open more businesses and activities\n\nWith dwindling daily cases and more widespread testing, state leaders will seek to reopen higher-risk businesses where customers and workers are in close contact for longer periods of time, such as nail shops and hair salons. Gyms, movie theaters and churches may also open in this phase. Some states, such as Georgia, are already moving to this phase.\n\nAs states carefully relax restrictions, contact tracing will play an increasingly important role in monitoring the spread of the virus. Contact tracing is a long-accepted tool used by public health officials to identify infected individuals and anyone who may have come in close proximity with the person who tested positive for the disease. To help identify possible new COVID-19 cases, health officials are looking to our mobile phones to build a list of contacts.\n\nNow playing:\nWatch this:\n\nContact tracing explained: How apps can slow the coronavirus\n\n\nPhase 4: Herd immunity or a vaccine will help restore normalcy\n\nThe goal of the first three phases is to get us to a point of community-wide resistance to the coronavirus. One way to achieve that is called herd immunity, which means that 60% or more of the population has been exposed to the coronavirus and have gained some degree of immunity from it. The other approach is through a vaccine, which is still thought to be a year or more away. Once we do have a safe and effective vaccine and antiviral medicine to protect and treat the population, authorities will be able to fully lift social-distancing orders and bring on a new normalcy.\n\nWhat about travel bans and restrictions?\n\nReopening public transit and other methods of mass transportation such as airline and train travel for nonessential trips is an important but potentially higher-risk stage, because passengers are often in close contact for extended periods of time. Domestic airline travel already comes with a set of restrictions, but international vacations aren’t currently encouraged. And in some cases they aren’t even possible, as airlines have cut routes.\n\nStates will also look to relaxing interstate travel: Some states, including Hawaii and Rhode Island, require anyone who arrives in the state — resident, visitor or tourist — to self-quarantine for 14 days.\n\nAs your state opens up, you’ll still want to take steps to make sure you stay safe. Here’s how to keep the virus out of your home, how to avoid misinformation about the virus and what you need to know about coronavirus treatment. If your state or region is easing its coronavirus restrictions, let us know in a comment.\n", "pred_label": "__label__1", "pred_score_pos": 0.9891263842582703} {"content": "Life will test you\n\n“In life there will be people, life tests, health challenges and much more that will always try to knock you down. If it doesn’t knock you down the wind against you will push you back further and further more. No matter how strong the wind is going against you and no matter how many times you will get hit in such a way it’ll make you feel weak. During all of those troubled times and hard obstacles that is where you will find strength. If you feel like you’re stuck, lost in the fog, being poured on with rain, feeling drained and tired because there is too many clouds over you. That is when you MUST keep going. You’re the vehicle to your own destiny and god is your fuel.” ~Victortheinspiration", "pred_label": "__label__1", "pred_score_pos": 0.6312094330787659} {"content": "Manish Nai, Form and Void: Richard Taittinger Gallery, 154 Ludlow St, New York, NY\n\n16 January - 28 February 2021\n\nIn collaboration with Richard Taittinger Gallery, Kavi Gupta is pleased to present Form and Void, a solo exhibition of works by the acclaimed Mumbai artist Manish Nai. Featuring examples from several diverse facets of Nai’s trans-disciplinary practice, this exhibition seeks to explore the formal and conceptual balance between absence and presence in Nai’s unique aesthetic position.\n\nNai’s minimalist sensibilities find balance between form and void, gravity and levity, the highly personal and the truly universal. His substances are distinctly Indian, both past and present, but the forms they take have the abstract logic of geometry. Jute and indigo relate back to the history of India’s occupation by the British empire, cash crops cultivated at the expense of farmers who desperately needed to be producing food to combat famine. The clothes speak to cultural moments, a grandmother’s patterned shawl so reminiscent of one generation in India, a child’s t-shirt so clearly speaking to another, bundled together like laundry of multiple generations living together under a common roof. Stacks of books layered like sedimentary rock forming a timeline of cultural production. Mosquito nets ubiquitous throughout the tropics, found in homes around the world, both for safety and for comfort. Even the act of compression, used in his making, relates to the notion of social, historical, and economic pressures. Despite all these distinct cultural narratives embedded in the work, there is an aspirational, transcendent universality to the work’s disciplined minimalism.\n\nPerfect geometry inspires the boundaries of each work’s formation. Point, line, plane, and form interplay their abstract logic with the limitless potential of the organic materials that form them. The artist’s gestures’ totalities extend beyond the objects to include specific absences around them, negative space implicitly tethered to the positive object. A jute ring highlights an empty wall, the total volume described by the piece consisting more of empty space than of the jute itself. Leaning pillars of compressed fabric cast shadows on the gap they create, delicately balanced as an interstitial between floor and wall. Mosquito nets catch pale stains of paint that mostly passes through them, visually elusive and physically transient. Every object is riddled with gaps and fissures, and the nature of their installation in space always necessitates some negotiation with the emptiness around it. This emptiness is not just a coincidence, nor a consequence of scale, but an apparatus inborn to the work itself, absence loaded with possibility, void where form can come to have purpose. Composer Claude Debussy famously observed that music is not just the notes, but the silence between them; Nai’s work serves as reminder that sculpture too is not just its own substance, but the shadow it casts, and the space it takes ownership of outside its physical boundaries.\n\nManish Nai was born in 1980 in Gujarat. He has held solo exhibitions at Kavi Gupta Gallery in Chicago, Galerie Mirchandani + Steinruecke in Mumbai, Galerie Karsten Greve in Paris, St. Moritz and Cologne, and Galerie Gebr. Lehmann in Berlin. In 2017, the Fondation Fernet Branca presented a comprehensive exhibition of the artist’s paintings, murals, sculptures and photographs in St. Louis, France. The exhibition traveled to the Het Noordbrabants Museum in The Netherlands in 2018.\n\nNai has participated in the Kochi-Muziris Biennale (2014) and the Shanghai Biennale (2012). He has recently completed a 60’ long sculpture as a permanent installation in Mumbai’s Bandra-Kurla Complex. His works have recently shown at The Sculpture Park at Madhavendra Palace, Rajasthan, India (2017-18), Kasturbhai Lalbhai Museum in Ahmedabad, Gujarat, India (2019), and at the Smart Museum of Art in Chicago as part of their permanent collection. Nai’s work is held in numerous private and public collections throughout Asia, Europe, and North America. The artist lives and works in Mumbai.", "pred_label": "__label__1", "pred_score_pos": 0.9994502663612366} {"content": "By: Ellaine Kryss Hubilla\n\n\nKokedama, which translates to “koke” which means moss and “dama” which means ball, is a century-old Japanese garden art that involves taking the root ball of a plant and attaching it to a mud ball, which is then coated with green moss.\n\nKokedama is also known as the ‘string garden’ and ‘poor man’s bonsai’—basically because plants can still strive even if they’re hung.\n\nTetchie Palaganas’ demonstrating how to create your own kokedama.\n\nYou can take care of your kokedama just like any other ornamental plant; it also needs sunlight, air, and water. However, the difference in watering is that it must be soaked in water for 30 mins per day so that water can reach the soil and the root inside. After soaking, gently press the moss ball to drain excess water. \n\nIt can be hung in the air with the plant growing out from the sphere or simply put it in the place you prefer as long as it will receive enough sunlight. Kokedama also serves as a distinctive display piece and also functions as a living planter.\n\nGarden enthusiast Tetchie Palaganas offers instructions on how to create your own moss ball:\n\n\n– Plant of your choice: use an easy-to-care plant, so it can easily adjust to the conditions of the ball soil\n\n-Soil mix: use a combination of 50% garden soil, 30% pumice, and 20% clay.\n\n-Moss: enough amount that can cover the ball soil\n\n-Strings: yarn for knitting or thread\n\n\n\n\n\n 1. Create a mixture using 50% garden soil, 30% pumice, and 20% clay. Add enough water to hold your soil mix together but not too many that the mixture will be too soft.\n 2. Lay the moss flat on a surface then moisten it with water and leave it for a while.\n 3. Press the mixture firmly to form a ball of soil. Make it big enough to accommodate the size of the roots of your chosen plant. If the roots are still long enough to fit the ball soil, trim it but make sure that baby roots will remain.\n 4. Remove your selected plant from the container. Dust off excess soil then carefully break apart the root ball, this will allow the roots to absorb water and soil nutrients better.\n 5. Using your hands, divide the ball of soil into two parts at the center. Put the roots of the plant between the two divided parts then press it again to re-form the soil into a ball.\n 6. When the plant is already attached to the balled soil, cover the ball with the moss until all surfaces are covered.\n 7. Attach the moss onto the ball using yarn or thread. Since thread is thinner than yarn, when using it, double the wrap by at least two passes around the surface.\n 8. Cut the excess string. Your kokedama is ready. You can attach the ball into a piece of wood, put it in a pot if you prefer, or place it in an appropriately lighted area.\n\n\nFrom Tetchie Palaganas’ Kokedama Workshop, which was part of the Stuck On You Pre-Valentine event of the National Cactus and Succulent Organization of the Philippines, Inc.", "pred_label": "__label__1", "pred_score_pos": 0.986998975276947} {"content": "Gregotti Associati. Lombarda Headquarters' bank.\nBrescia, Italy. 2004\n\nGregotti Associati,\n\n\nBanks, Offices,\n\nGlass, Cement, Steel,\n\nA cube measuring 55 metres on each side, two wings, a public courtyard and a truncated pyramid make up the new Banca Lombarda headquarters in Brescia, a construction with simple lines and complex form designed by Gregotti Associati and built in the \"Brescia 2\" urban expansion zone.\n\nGregotti Associati. Lombarda Headquarters' bank.
Brescia, Italy. 2004 The project was built on a 14 thousand square metre lot, offering an alternative to the vertically oriented tower system typically used for office buildings.\nThe most expressive element in this geometric game is the pyramid-shaped volume containing two large meeting rooms: one with 500 seats and another with 150. These halls may be used for public events and have their own separate entrances. The floors containing the bank's offices are supported by three sets of large metal trusses, placed on two levels to correspond with the north stairway. The building has 12 levels with a total height of about 55 metres.\nBasement levels add to the amount of space available: two under the building and three outside its perimeter. The area around the building is organised like a public piazza.\nFour stairway towers covered with marble cladding mark the building's four corners, clearly defining its \"perimeter\" and plan. Reinforced concrete is the dominant material in most of the complex, with the exception of the suspended walkway, which is designed to be a bridge on multiple levels. Its 36 metre span is underlined with steel, which plays a key role in this part of the building, giving it greater transparency and lightness.\n\nCookie Policy\n\n", "pred_label": "__label__1", "pred_score_pos": 0.6024045944213867} {"content": "Coronavirus COVID-19 Global Shipping Updates\n\nDear Faithful customer, \nWe are currently experiencing a considerably high order volume and shipping / delivery times may be delayed.\nMany of our products on Gearlando are in high demand, but we are continually improving processes and systems to be caught up in this huge increase in demand. \nWhat you need to know:\n. We have a lot of inventory and our factories are operating at full capacity, overall. . Most orders must be shipped within one to two business days.\n. Certain orders may not go out within one working day after their order. . A small percentage of orders can take more than 3 working days to be dispatched depending on the products ordered. \n. There is a significant reduction in passenger flights worldwide, the freight space available to the shipping companies we work with has decreased, increasing the shipping costs.\nWhy are we saying this:\n. We always offer FREE WORLDWIDE SHIPPING, no matter where you are in the world. . In order to keep costs low, we use economical international delivery. We have considered offering priority delivery at an additional cost, but that would defeat our mission to keep costs low for our valued customers.\n We are very grateful for your patience and your confidence as we went through this difficult time. We are delighted that so many people are turning to cycling, but we certainly wish it was in happier circumstances.\nWe also appreciate your patience and will do whatever is necessary to get your order delivered. But please note that in most cases your order will take between 30 and 40 days. \nStay safe and healthy,\nThe Gearlando team", "pred_label": "__label__1", "pred_score_pos": 0.5424290299415588} {"content": "Character Narrators\n\nby Boswell\n\nQuestion: If I'm writing a story in which the narrator is actually not the protagonist, just a close friend/flatmate/love interest/etc (think Sherlock Holmes, except not about mysteries), would that change how I write it, or would it be pretty much the same, just not from the protagonists POV?\n\nAnswer: It depends who the main character is. And by that, I mean who's decision at the climax determines the outcome?\n\nYou can have a character narrator who is fairly uninvolved in the story and simply reports it. In that case, the main character may still be the protagonist and the narrator must convey the protagonist's point of view, including his internal conflict and the decision/action he takes at the crisis.\n\nOn the other hand, you can have a character narrator who is the main character. In this case, the character narrator will be wrestling with his/her own internal conflict. The narrator will have to make a decision at the climax of the story whether to change or stay the same, and that decision may determine the outcome of the story.\n\nFor instance, in the recent British TV series, Sherlock (a 21st century retelling of Sherlock Holmes), Holmes is the impact character and Watson is the main character. Yet, if you watch the first episode, Holmes is also the protagonist pursuing the story goal of catching the murderer.\n\nAt the climax, Holmes confronts the murderer - a man who talks people into swallowing poison. For a moment, we are not sure who will win the conflict. It looks as though the murderer might talk Holmes into commiting suicide.\n\nBut Watson, an ex-soldier who hates civilian life, makes an important decision. He shoots the murderer and thereby chooses to become a man of action again. The resolution of his internal conflict also determines the outcome of the external story.\n\nSo you have to decide how interested you are in your narrator. How important will his internal conflict be? Who is the real main character? That will affect how you tell the story.\n\nClick here to post comments\n", "pred_label": "__label__1", "pred_score_pos": 0.9843542575836182} {"content": "Norway proposes CO2 tax hike to increase funds for climate mitigation\n\n\nFrom Yale Environment 360\n\nNorway has announced plans to nearly double its carbon tax on the nation’s offshore petroleum sector to create a £1 billion fund  to help combat the effects of climate change, including in developing nations.\n\nIn a draft budget released this week, government officials proposed a climate program that would increase the tax on oil companies from about £24 per ton of carbon dioxide to £45 (Nkr410) per ton.\n\nThe plan would allocate about £1 billion (Nkr10 billion or about $.129 billion U.S. dollars are current exchange rates) to promote green energy initiatives, reduce carbon emissions, and improve food security in developing countries.\n\n\nweb stats\n", "pred_label": "__label__1", "pred_score_pos": 0.9997641444206238} {"content": "Generic filters\nExact matches only\n\n\n\nIn California\n\n\nProtecting crops from diseases requires an effective mitigation plan that begins the moment the soil is prepared and continues until the harvest. Our full line of plant disease products offers growers multiple approaches for treating the water, the soil and the crop itself.\n\nWhat Is Crop Disease Management?\n\nIn the simplest terms, plant disease management means protecting plants from conditions and contaminants that can lead to problems. This frequently involves killing, removing or blocking pathogens such as mold, mildew and bacteria. However, pathogens can attack from multiple vectors and may be airborne, waterborne or live in the dirt. In order for a plan to be truly effective, it must address all possibilities and focus on the most likely sources of trouble. In many cases, crop treatments to be applied directly to the plants. In other instances, they must be added to the water used to irrigate the plants or the ground in which they grow.\n\nIntegrated plant disease management is extremely important for a number of reasons. Farmers need to be able to prevent the spread of pathogens throughout their fields to ensure the highest yields and quality. Without an effective strategy for contaminated land remediation, they run the risk of growing crops that don’t reproduce in the proper manner, fail to thrive or fall short of the expected yield. Any of these conditions can reduce a farm’s productivity and have a devastating effect on its profitability.\n\n\nWhy Choose Meras Water Solutions?\n\nWith a wide variety of products used for powdery mildew management and other types of plant disease control, no one offers more solutions for crop disease management in California than Meras Water Solutions. We have a complete line of agricultural plant disease products, including a contaminated soil treatment, that can be applied to the plant, soil and water for full protection. Our in-house expertise means we can develop a solution that meets your precise requirements, no matter what they might be. We’re dedicated to providing our customers in the agriculture sector with the most advanced and effective answers to their needs.\n\nWith our services at your disposal, you can rest easier knowing your crops will have a much lower chance of developing diseases that can hurt your yield and your operation. Our products include:\n\nFoliar Treatment\n\nOur active ingredients work immediately on contact with your ornamentals, bedding plants, vegetable plants, flowering plants, shrubs and trees.\n\nMicro Irrigation Treatment\n\nWe offer a variety of soil remediation technologies that help you treat your irrigation water and protect your valuable crops.\n\nSoil Treatment\n\nUse a direct soil treatment periodically throughout the plant’s life up to the day of harvest.\n\nSoilSolv chemistry converts water and soil scale into nutrition.", "pred_label": "__label__1", "pred_score_pos": 0.7314040660858154} {"content": "Experimental Study on the Reaction of ScCO2 and Organic Matter in Coal and Its Pore Structure Response\n\nAuthor:Wang Tian\n\nSupervisor:sang shu xun\n\n\nDegree Year:2018\n\n\n\n\n\nCO2 geological sequestration and enhanced coalbed methane recovery technology combines win-win effect of greenhouse gas emission reduction and new energy development,which has attracted worldwide attention.Deep unmineable coal seams are the potential geological body for CO2 geological sequestration,however,under the influence of formation water,temperature and pressure in deep coal reservoir,CO2,especially for supercritical CO2(ScCO2),can produce geochemical reaction with the organic matter of coals and rocks,resulting in the changes of coal physical and chemical structure.Based on the“ScCO2/H2O simulation system and coal/rock geochemical reaction device”,five coal samples with different ranks were chosen to conduct simulated experiments of coal/rock-ScCO2-H2O geochemical reaction under three buried depths.Based on various analytical approaches of X-ray diffraction,Raman spectroscopy,Fourier transform infrared spectroscopy,mercury injection porosimetry,low temperature liquid nitrogen adsorption,CO2 adsorption and field emission scanning electron microscope,the effects of coal/rock-ScCO2-H2O interaction on the organic matter and pore-fracture structure of coal reservoir were investigated.The influences of coal rank,temperature and pressure conditions on the geochemical reaction of coal/rock were also studied.Further,the mechanism of ScCO2 and organic matter in coal and its control actions on coal pore structure were discussed.The main research achievements are concluded as follows:(1)The coal/rock-ScCO2-H2O reaction significantly influences the crystal structure,carbon order degree and aromatic ring condensation of organic matter in coalsThe coal/rock-ScCO2-H2O reaction destroys the chemical bonds and crystal structural integrity and changes the macromolecular structure of coals,and which effect mainly depends on the coal rank,i.e.,for low rank coals,the lamellae spacing decreases,the degree of parallel orientation increases,the aromaticity and aromatic ring condensation increases;while for medium-high rank coals,the disordered structure and lamellae spacing of the coal microcrystalline structure increases,the crystal size decreases and reduces the carbon order degree of coals,resulting in a reduction in the aromaticity and aromatic ring condensation.In addition,the influence of temperature and pressure on coal macromolecular structure is not significant in when simulate actual coal seam depth in this paper.(2)The effect of coal/rock-ScCO2-H2O reaction on the pore structure in coals is significant,and the reaction mainly affects the pore structure of coals via changing that of mineral and organic matter structureAfter reaction,the brittleness,porosity and macropore volume of coals increases,the micropore volume and specific surface area of low rank coals decreases,which are contrary for medium-high rank coals increase.Despite coal/rock-ScCO2-H2O reaction does not change the pore size distribution of coals,it produces a large number of<100nm and>30μm pores.Specifically,the pore volume with diameter<3 nm and>30μm in medium-high rank coals considerably increases.The ScCO2-H2O reaction increases the non-effectively interconnected pores in coals,indicating that ScCO2 is dispensable in improving pore connectivity.The change of pore structure in coals is mainly controlled by coal rank,the influence of temperature and pressure on pore structure change is relatively weak,and porosity increases with the increase of temperature and pressure.After ScCO2-H2O reaction,the variation characteristics of pore structure are influenced by the mineral content,type and organic structure of coals.Mineral mainly affects macropore and mesopore with larger pore diameter,while the effect of organic matter on pores is concentrated in the<10 nm pore size range.(3)Simplified models of low rank and medium-high rank coal structure were constructed,the mechanism of ScCO2-H2O acting on organic matter in coals was ascertained,and coal rank mainly controlling the changes of organic matter structure was proposedThe ScCO2-H2O system mainly affects the organic matter structure through the chemical reaction:swelling effect,addition reaction,substitution reaction,bond dissociation reaction,etc.The structure changes of different rank coals are influenced by various chemical reactions,and can be related to the characteristics of the aromatic structures,categories of main organic groups and essences of cross-links.Low rank coals possess a low condensation degree of its aromatic structure,and its aromatic nuclei can facilitate addition reactions.Swelling effect primarily break cross-links between aromatic nuclei in the same aromatic layer.These characteristics favor the polymerization addition of aliphatic side chains of aromatic nuclei and promote the orientation rearrangement of molecular structure at the same layer,which makes the coal structure in a lower energy and more stable state,causing an increase in the aromaticity and aromatic ring condensation.Medium-high rank coals have a high condensation degree of their aromatic structures,and the aromatic favor substitution reactions.Swelling primarily break cross-links connecting different aromatic layer,and bond dissociation reactions are more significant for high rank coals,the force between aromatic layer is abate,crosslinking degree is reduced.These characteristic cause an increase in the lamellae spacing and decreases in the aromaticity and aromatic ring condensation in medium-high rank coal.(4)The mode that changes of organic structure influence small pore structure of coals was established,and the control mechanism of the organic structure changes for intermolecular pores and lamellae spacing pores in coals are clarifiedCoal/rock-ScCO2-H2O reaction has“increasing pore”and“shrinkage/expansion pore”effects on small pores in coals,and its influence depends on the organic structure of coals.The“increasing pore”effect is mainly lamellae spacing level pores,formed from aromatic layers stacked.Their pore diameter is about 0.4 nm,which is affected by the swelling effect,addition reactions and polymerization reactions in aromatic layer,and only a small part increase in the low rank coals with loose structure.The“shrinkage/expansion pore”effect is exhibited in the intermolecular pores and lamellae spacing pores,which affects the aperture<10 nm.This effect is caused by the changes of lamellae spacing and aromatic ring condensation,affected by swelling between layers,substitution reactions and bond dissociation reactions.The effect of temperature and pressure conditions on small pores is weak in this paper,indicating that the temperature and pressure range studied in this paper is insufficient to induce substantial changes on the organic structure of coals.", "pred_label": "__label__1", "pred_score_pos": 0.953834593296051} {"content": "Why Is Myopia Management Important?\n\nPublished April 23, 2020\n\nWhile myopia is common vision problem that makes eyewear a new necessity, it can also cause serious eye diseases later in life.\n\nMyopia occurs when the light entering the eye is focused in front of the retina, rather than directly on the retina. Myopia develops when the eye grows too long from front to back (axial length), and generally worsens over time until the eye is fully developed— usually around the age of 20.\n\nWhile distance-only glasses and contact lenses are the traditional method of vision correction for myopia, these lenses focus light in a way that can actually increase the axial length of the eye— ultimately causing myopia to worsen.\n\nA child with myopia has an increased risk for developing vision threatening eye diseases in the future, such as:\n\nIs there a way to prevent my child’s myopia from worsening?\n\nA number of recent studies suggest that it may be possible to control myopia by totally stopping, or at least slowing down, its progression during childhood and teenage years. \n\nMyopia management is a treatment program aimed at controlling myopia, keeping the level of myopia as low as possible, in order to reduce your child’s risk of developing vision threatening eye diseases later in life.\n\nMyopia management has shown to decrease myopia progression by up to 78 percent.\n\nMyopia management can involve the use of eyeglasses, contact lenses, and eye drops— all scientifically proven to aid in the control of myopia progression.\n\nA closer look at myopia management\n\n\nEyeglasses are a popular choice for children with myopia, as they enable vision acuity for distant images. Many times, reduced focusing skills can contribute to the development of myopia— these children may need a bifocal or multifocal lens to support the child’s focusing skills.\n\nBifocal and multifocal lenses contain different lens powers throughout the lens, and enable clear vision at all distances. The specific power for the child’s near vision reduces the stress on the eyes, and possibly the progression of myopia.\n\nContact lenses\n\nContact lenses provide clear vision at all distances, with a wider field of view as compared to eyeglasses. A multifocal contact lens works similar to eyeglasses to improve distance vision acuity while simultaneously reducing the stress on the eyes for reading and other near vision tasks. This can consequently reduce myopia progression.\n\nAtropine eye drops\n\nThese medicated eye drops can be used to dilate the eye’s pupils during an eye exam, but have also been proven to reduce myopia progression. A very low dose of this eye drop is placed in the child’s lower eyelid every day.\n\nThis method is effective for children between the ages of 8 and 15, it only requires a single drop into the child’s eye once per day. Side effects may include blurry near vision or light sensitivity. Children will still need to wear their regular glasses or contacts during the day, but the eye drops can assist in slowing down the worsening myopia.\n\nOrthokeratology (Ortho-k)/ Corneal refractive therapy (CRT)\n\nOrtho-k reduces myopia progression through the use of specialized rigid contact lenses that reshape the cornea, the front outer surface of the eye. The contacts work to flatten the cornea, thereby changing the way light is focused on the retina at the back of the eye.\n\nThe contact lenses are inserted before bedtime, and are generally only worn while your child sleeps. Ortho-k provides clear vision for the whole day, thereby eliminating the need for wearing glasses or contacts during the day.\n\nOrtho-k has been proven to reduce the rate of myopia  progression in children by up to 50 percent.\n\nCan vision therapy control myopia progression?\n\nVision therapy is an appropriate and effective treatment for children who have acquired myopia as a result of reduced eye focusing skills. Vision therapy involves a personalized program that trains the child’s visual system, including the eye-brain connection, to work more efficiently— thereby improving focusing abilities. Children who have reduced focusing skills, have a greater risk of developing progressive myopia.\n\nWhen should my child start myopia management?\n\nIt is best to begin Myopia management as soon as possible to increase optimal results. Myopia generally worsens through the teenage years, and stabilizes as the child reaches adulthood, so these years are the optimal time to seek Myopia management options for your child.\n\nThere are now excellent myopia management options to help your child. An eye doctor with experience in myopia management will be able advise which treatment option is most effective for your child.", "pred_label": "__label__1", "pred_score_pos": 0.6978707313537598} {"content": "RHAPSODY is a word in English with its meaning.\n\nA disconnected series of sentences or statements composed\nunder excitement, and without dependence or natural connection;\nrambling composition.\n\nWords for further learning\n\nHiligaynon: sugyot\nEnglish: disinheritance\nEnglish: climbing\nEnglish: atonable\nEnglish: microcosmic\nEnglish: polymorphic\nEnglish: whisking\nCebuano: birnis\nEnglish: copse\nHiligaynon: pakilooy\nEnglish: dachshund\nEnglish: hull\nEnglish: renitent\nEnglish: adnascent\nHiligaynon: sanggit\nEnglish: wapp\nEnglish: fico\nEnglish: unlawed\nCebuano: banay\nEnglish: frank", "pred_label": "__label__1", "pred_score_pos": 0.962776243686676} {"content": "North America Wheat Flour Market Forecast to 2027 - COVID-19 Impact and Regional Analysis By Product Type, End User, Application, and Distribution Channel\n\n\n • October 2020 •\n • 83 pages •\n • Report ID: 5989592 •\n • Format: PDF\nThe wheat flour market in North America is expected to reach US$ 44,439.08millionby 2027 fromUS$36,347.79million in 2019 and is expected to grow at a CAGR of 2.9% from 2020 to 2027.\n\nHealth benefits of wheat flourare bolstering the growth of thewheat flour market.Wheat flour is considered one of the most popular food ingredients consumed worldwide.\n\nIt is widely known for its nutritional properties and health benefits such as reducing cholesterol levels, regulating metabolism, minimizing obesity, and balancing blood sugar levels.Wheat flour is considered as a rich source of gluten—a protein that adds strength and elasticity to the baked products.\n\nThe amount of gluten may vary according to different varieties of wheat flour available.Additionally, wheat flour is composed of highly nutritious fiber and has abundant presence of essential nutrients, such as vitamins, minerals, and catalytic elements, especially vitamin B and E.\n\nMoreover, wheat flour is known to impart nourishment, skin protection, and energy required for overall body functions. Wheat manufacturers have also introduced vitamin-A fortified wheat flour to cater to the nutritional needs of the population. Owing to its properties, wheat flour is used in numerous applications across several industries, including food and personal care. The demand for wheat flour is especially high in food industries due to its growing need in bakery and confectionery products.\n\nRising inclination toward healthy lifestyle and growing instances of diabetes, cancer, and other such diseases are among the factors driving the growth of the market under study.Also, rising preference toward convenience staple foods, along with growing preference of high-protein flour products, is positively affecting the market growth.\n\nFurthermore, several initiatives are being taken to support food fortification as a measure to minimize the instances of malnutrition.Evolving trends of healthy food, rising application of wheat flour in bakery goods and confectionaries, and launch of products with wheat flour as an ingredient are driving the demand for wheat flour across North America.\n\nAdditionally, the growth of food & beverages, cosmetics, and other industries is expected to propel the demand for wheat flour across North America.\n\nIn terms of application, the bread segment held the largest share in the North America wheat flour market in 2019.There has been an increasing demand for wheat flour bread across North America, owing to its high nutritional profile.\n\nWheat flour is the considered as the common varieties of flour extensively used in preparation of bread.Wheat flour is composed of gluten, which is considered key source of protein and is quite significant ingredient in yeast-leavened breads.\n\nIn breads, wheat flour such as all-purpose flour, white bread flour, fine French bread flour, high gluten flour, semolina flour and other such kind of flours are significantly used in preparation of different varieties of breads.These flours can be used alone or blended with enriched one or other types of wheat flours depending on the type of bread being developed.\n\nWith the rise in consumption of bread as a part of breakfast along with rapid innovations are some factors likely to affect the demand of wheat flour in bread-making purpose.\n\nCOVID-19 has affected economies and industries in various countries due to lockdowns, travel bans, and business shutdowns.In North America, the US has the highest number of confirmed cases of COVID-19, compared to Canada and Mexico.\n\nThis is likely to negatively affect the food &beverages industry in the region as, due to the COVID-19, the supply chain is likely to get affected. In addition, the overall manufacturing processes and research and development activities are also expected to impact the market growth.\n\n\nThe process also serves the purpose of obtaining overview and forecast for the North America wheat flour market with respect to all the segments pertaining to the region.Also, multiple primary interviews have been conducted with industry participants and commentators to validate the data, as well as to gain more analytical insights into the topic.\n\nThe participants who typically take part in such a process include industry experts, such as VPs, business development managers, market intelligence managers, and national sales managers, along with external consultants, such as valuation experts, research analysts, and key opinion leaders specializing in the North America wheat flour market.Key players operating in the North America wheat flour marketincludeArcher-Daniels-Midland Company; Ardent Mills, LLC; General Mills Inc.; George Weston Foods Limited; King Arthur Baking Company, Inc.; KORFEZ Flour Group; and Manildra Group.\n\nWe are very sorry, but an error occurred.\nPlease contact if the problem remains.", "pred_label": "__label__1", "pred_score_pos": 0.9820165634155273} {"content": "Great News! BMC has released their first hotfix for v12.1. This will provide customers still running previous versions of Client Management a more stable upgrade path. Version 12.1 offers much more functionality in two key areas.\nThe first major improvement is in OS Deployment. This version is a complete overhaul of the module which allows the ability to do PXE boot using regular BIOS and now UEFI. This means using the newer 8.1 AIK vs. the previous WAIK version. If you are currently using OS Deployments, pre-planning is required prior to upgrading so please read through all the documentation and plan accordingly. Additionally, OSD provides the ability to deploy OS using a USB drive no longer limited to just PXE boot implementation.\nThe second major improvement is found in the Compliance Module. For our customers who require methods to audit and ensure compliance standards and use SCAP as a “Plug and Play” method to verify compliance, “Deviations” and “Exceptions” have been added to better represent how your organization reports its compliance. This added feature will allow for IT Security to better understand how secure the environment really is! Now you can quickly see those devices that have exclusions from various Group Policies with “Notes” explaining the reason(s) why those devices were excluded from the standard hardening. In addition, combined reporting is in the works which will allow customers to combine both SCAP reporting and add Custom Compliance Rules to create a single report allowing for a more seamless method to validate compliance especially during an audit.\nIt is always recommended to stay as current on versions as possible to maintain the highest level of performance when running Client Management. With this latest release, customers can upgrade and take advantage of all the newest functionality and stability.\nIn my experience, customers benefit greatly using RightStar’s professional services to assist in both the upgrade process and understanding all the new features provided with every new upgrade. You can contact RightStar at (703) 242-7200 or email our account reps at [email protected].\nPlease review for a list of all new features for v12.1\nItems Corrected in latest Hotfix", "pred_label": "__label__1", "pred_score_pos": 0.9641286134719849} {"content": "New Fallout From ‘The Collision That Changed The World’\n\n\n“These results are different from anything people have previously seen,” said Emma Kast, a graduate student in geosciences and the lead author on a paper coming out in Science on April 26. “The magnitude of the reconstructed change took us by surprise.”\n\nKast used microscopic seashells to create a record of ocean nitrogen over a period from 70 million years ago — shortly before the extinction of the dinosaurs — until 30 million years ago. This record is an enormous contribution to the field of global climate studies, said John Higgins, an associate professor of geosciences at Princeton and a co-author on the paper.\n\n“In our field, there are records that you look at as fundamental, that need to be explained by any sort of hypothesis that wants to make biogeochemical connections,” Higgins said. “Those are few and far between, in part because it’s very hard to create records that go far back in time. Fifty-million-year-old rocks don’t willingly give up their secrets. I would certainly consider Emma’s record to be one of those fundamental records. From now on, people who want to engage with how the Earth has changed over the last 70 million years will have to engage with Emma’s data.”\n\nIn addition to being the most abundant gas in the atmosphere, nitrogen is key to all life on Earth. “I study nitrogen so that I can study the global environment,” said Daniel Sigman, Princeton’s Dusenbury Professor of Geological and Geophysical Sciences and the senior author on the paper. Sigman initiated this project with Higgins and then-Princeton postdoctoral researcher Daniel Stolper, who is now an assistant professor of Earth and planetary science at the University of California-Berkeley.\n\nEvery organism on Earth requires “fixed” nitrogen — sometimes called “biologically available nitrogen.” Nitrogen makes up 78% of our planet’s atmosphere, but few organisms can “fix” it by converting the gas into a biologically useful form. In the oceans, cyanobacteria in surface waters fix nitrogen for all other ocean life. As the cyanobacteria and other creatures die and sink downward, they decompose.\n\nNitrogen has two stable isotopes, 15N and 14N. In oxygen-poor waters, decomposition uses up “fixed” nitrogen. This occurs with a slight preference for the lighter nitrogen isotope, 14N, so the ocean’s 15N-to-14N ratio reflects its oxygen levels.\n\nThat ratio is incorporated into tiny sea creatures called foraminifera during their lives, and then preserved in their shells when they die. By analyzing their fossils — collected by the Ocean Drilling Program from the North Atlantic, North Pacific, and South Atlantic — Kast and her colleagues were able to reconstruct the 15N-to-14N ratio of the ancient ocean, and therefore identify past changes in oxygen levels.\n\nOxygen controls the distribution of marine organisms, with oxygen-poor waters being bad for most ocean life. Many past climate warming events caused decreases in ocean oxygen that limited the habitats of sea creatures, from microscopic plankton to the fish and whales that feed on them. Scientists trying to predict the impact of current and future global warming have warned that low levels of ocean oxygen could decimate marine ecosystems, including important fish populations.\n\nWhen the researchers assembled their unprecedented geologic record of ocean nitrogen, they found that in the 10 million years after dinosaurs went extinct, the 15N-to-14N ratio was high, suggesting that ocean oxygen levels were low. They first thought that the warm climate of the time was responsible, as oxygen is less soluble in warmer water. But the timing told another story: the change to higher ocean oxygen occurred around 55 million years ago, during a time of continuously warm climate.\n\n“Contrary to our first expectations, global climate was not the primary cause of this change in ocean oxygen and nitrogen cycling,” Kast said. The more likely culprit? Plate tectonics. The collision of India with Asia — dubbed “the collision that changed the world” by legendary geoscientist Wally Broecker, a founder of modern climate research — closed off an ancient sea called the Tethys, disturbing the continental shelves and their connections with the open ocean.\n\n“Over millions of years, tectonic changes have the potential to have massive effects on ocean circulation,” said Sigman. But that doesn’t mean climate change can be discounted, he added. “On timescales of years to millenia, climate has the upper hand.”", "pred_label": "__label__1", "pred_score_pos": 0.9994454979896545} {"content": "COVID-19 Protocols\n\nCOVID-19 protocols guide (for Victoria's protocols, please contact her directly)\n\nSection A: Plan for Return to Clinical Practice (massage therapy)\n\nSection B: Patient Self-Assessment Questionnaire\n\nSection C: What this means for your appointment (massage therapy)\n\nPlease be aware that the \"Plan for Return to Clinical Practice\" and the \"Patient Self-Assessment Questionnaire\" are fluid documents that may change at any time, pursuant to changes from the CMTBC, the RMTBC, of the office of the PHO. Thank you\n\n\nPlan for Return to Clinical Practice [2020-05-14] [edited 2020-05-16] [edited 2020-09-07]\n\n\n1- Ensure that the patient understands that while the RMT has taken measures to minimize risk of viral transmission, the nature of massage therapy means that physical distancing is not possible in the treatment room.\n\n2- Advise the patient regarding the use of PPE. (masks, etc)\n\n3- The patient must complete an honest evaluation of the presence of the following symptoms: fever, chills, cough, shortness of breath, sore throat/painful swallowing, stuffy or runny nose, loss of sense of smell, headache, muscle aches, fatigue, loss of appetite. The patient must answer the following questions:\n\n • Has the patient limited their contacts and followed the advice of the PHO?\n\n • Has the patient had extensive contact with individuals outside their immediate family, pod, or unit (other than service workers at grocery stores, banks, other)?\n\n • Is the patient aware of anyone in their contacts who has COVID-19 symptoms?\n\n4- The patient must not have left BC within the 14 days prior to the appointment\n\n5- The day prior to treatment, the patient must complete the Pre-screening Questionnaire which will be sent in an email, and RMTs must complete the BC Covid-19 Self- Assessment daily.\n\n6- For immunocompromised or at-risk health groups, the patient and RMT must discuss the benefits of treatment, and ensure that the benefits outweigh the risks to the patient’s health\n\nArrival screening:\n\n1-The patient and RMT must review the steps taken in the pre-screening to ensure that they were completed, and cancel the treatment if the patient does not meet the pre-screening criteria.\n\n2- The patient must be aware that they are empowered to make decisions regarding their own safety in the treatment environment - ex. The patient can ask that the RMT wear gloves or goggles, if the patient so desires.\n\n3- For immunocompromised or at-risk health groups, the RMT may decide to take extra preventative measures even if the patient does not demand them. If the patient does not consent to extra preventative measures (ex does not want the RMT to wear a mask or other PPE), the RMT may cancel the treatment in order to protect the patient.\n\nPhysical distancing:\n\n1-The patient must follow the clearly marked lines for direction of travel through the waiting area to ensure 2m of clearance between people.\n\n2-The fabric waiting room chairs will be removed and replace with 2 plastic chairs that can easily be sanitized - these chairs will seldom be used but will be there in case elderly or infirm patients require a place to rest.\n\n3-The patient must arrive unaccompanied unless patient is a minor who requires parent/guardian, or infirm and needs assistance.\n\n4-The patient is required to wait outside the clinic on the second floor breezeway at the area marked with the “WAITING FOR TOWN CENTRE INTEGRATED THERAPIES” sign.\n\n5-The patient will be let in and out by the RMT, who will use sanitized barriers to touch door handles so that the patient touches nothing.\n\n6- Physical distancing is not possible during hands-on treatment, which is why pre-screening, hand hygiene, and enhanced cleaning are essential to minimize risk to all.\n\n7-The clinic will place signage in the common areas of 3041 Anson Ave regarding physical distancing on the stairwells and in the elevator.\n\nHand Hygiene:\n\n1-The patient must either:\n\nwash their hands with soap and warm water for a minimum of 20 seconds\n\n\nuse alcohol-based hand sanitizer on the fronts and back of both hands\n\nupon arrival to and departure from the clinic.\n\n2- If the patient’s hands are visibly soiled, the patient must wash them with soap and water, not just hand sanitizer.\n\n3- The RMT must wash hands with warm water and soap for a minimum of 20 seconds before and after every treatment, and at any other time when they have touched common surfaces or any potential contaminant.\n\n4- Hand washing protocols must be posted at every sink\n\n5-To prevent handling of money or cards, fully contactless payment can be made by e-transfer to (preferred) or the patient can upload their credit card into our secure Jane Payments feature in their patient profile. Receipts are emailed to the patient.\n\n6- Tissues will be provided in the treatment room so that the patient may open the door without touching the door knob directly.\n\nFace Touching Avoidance:\n\n1-The patient must be reminded that coronavirus can be spread by touch if a person has used their hand/s to cover a cough or a sneeze.\n\n2- The patient should be invited to use tissues supplied by the clinic if they need to touch their face due to a tickle or itch that they need to address. There must be tissues available to the patient in reception, the treatment rooms, and the washroom.\n\n3- The patient must be made aware that proper mask use requires hand sanitizing before and after touching a mask - every time the mask is touched.\n\n4- The RMT must use a hand towel or tissue if they need to touch their face.\n\nEnhanced Cleaning and Sanitizing:\n\n1-Visibly soiled surface must be cleaned immediately and then disinfected.\n\n2-High-touch surfaces (handles, knobs, taps, computers, phones, stools, light switches, counters, chairs..) must be disinfected after every patient, even if they do not appear to be soiled.\n\n3-Linens must continue to be washed in hot soapy water after each use.\n\n4- Sanitizing should be announced and if possible performed in view of patient to reinforce the steps taken to promote the safety of all.\n\n5- Time between patients to thoroughly sanitize will be scheduled, and so a 15-minute buffer will be in place between appointments to allow for sanitizing and for escorting the leaving patient out of the clinic and the arriving patient into the clinic.\n\n6- The treatment table including face cradle and arm rests will continue to be cleaned after each treatment, and the face cradle and arm rests will be sanitized a second time in view of the incoming patient.\n\n7- Thermophores and electrical blankets will no longer be used.\n\n8- Washroom taps, levers, and door handles will be disinfected with Lysol after each use. The washroom will be thoroughly disinfected a minimum of twice daily.\n\n9- If desired, the patient can leave the clinic with a tissue to use as a contact barrier to press the elevator buttons and door handles.\n\nPersonal Protective Equipment (PPE):\n\n1-The patient and RMT will both wear masks, if the patient can bring their own, this will be helpful. The RMT will have have clean fabric re-usable masks and single-use disposable masks available for patient use.\n\n2- The RMT will without question wear PPE such as gown, goggles, or gloves as requested by the patient, in order to help the patient feel feel safe.\n\n3- Hands must be washed prior to putting on a mask, prior to removing a mask, and after disposing of a mask in the garbage.\n\n4- The RMT will have single-use vinyl gloves and re-usable (disinfected) goggles if the patient requests their use.\n\nProfessional Obligations:\n\n1- The RMT must call Public Health if any patient alleges that they contracted COVID-19 from the RMT.\n\n2- The RMT must then cease practice and self-isolate until Public Health has investigated and provided direction.\n\n3- The RMT must obtain informed consent from the patient acknowledging that:\n\n • any massage therapy treatment involves some risk of COVID-19 transmission\n\n • the RMT is following a protocol to reduce or mitigate risk, but that risk cannot be reduced to zero;\n\n • the patient consents to treatment despite some risk\n\nThe RMT then documents the patient’s consent.\n\n\nPATIENT SELF-ASSESSMENT QUESTIONNAIRE [2020-05-14] [edited 2020-05-16] [edited 2020-06-10] [edited 2020-09-07]\n\n1-Are you experiencing any of the following: YES/ NO\n\n\n • Severe chest pain\n\n • Having a very hard time waking up\n\n • Feeling confused\n\n • Losing consciousness\n\n2-Are you experiencing any of the following: YES/ NO\n\n • Mild to moderate shortness of breath\n\n • Inability to lie down because of difficulty breathing\n\n\n3-Are you experiencing cold, flu or COVID-19-like symptoms, even mild ones? YES/ NO\n\n\n4-Have you travelled outside BC within the last 14 days? YES/ NO\n\n5-Did you provide care or have close contact with a person with confirmed COVID-19?\n\nNote: This means you would have been contacted by your health authority’s public health team. YES/ NO\n\n6-Are you assessing your risks and taking precautions to protect yourself and those around you in accordance with the PHO and the Chief Medical Officer of Canada (e.g. stay at home if you are unwell, no large gatherings, be physically distant from others, wash hands often, wear a mask in public spaces, etc)? YES/NO\n\n7-Have you had extensive contact with individuals outside your immediate family, pod, or unit (does not include grocery shopping or errands completed with appropriate physically distant procedures, or controlled/stable school cohorts/learning pods)? YES/ NO\n\n8-Are you aware of anyone in your contacts who has COVID-19 symptoms? YES/ NO\n\nInformed consent statement specific to COVID-19 enhanced safety protocols:\n\nI understand that while TOWN CENTRE INTEGRATED THERAPIES (TCIT) has taken measures to minimize the risk of viral transmission, the nature of massage therapy means that physical distancing is not possible in the treatment room. I understand that TCIT has a stringent protocol, following all the guidelines outlined by the RMTBC, the CMTBC, and PHO to mitigate risk, but the risk cannot be reduced to zero. I consent to treatment despite this risk.\n\n___________________ ______________________ ____________\n\nName (print) signature YYYY/MM/DD\n\nC. What this means for your appointment\n\n • The day before your appointment you will receive a phone call from us. This will likely occur between 7:00 and 9:00pm to increase the likelihood that you are home, not consuming your evening meal, and have not yet gone to bed. (if there is a more convenient time to call, please let us know and we will do our best to accommodate that). We will run through a pre-screening script with you, and ensure that you have completed the Pre-screening Questionnaire - most of which is directly from the BC COVID-19 Symptom Self-Assessment. Your honest and thoughtful answers are required to maintain the safety of everyone. If you satisfy us that you pass the assessment, your appointment will stand; if not, your appointment will be canceled or rescheduled.\n\n • Another before-treatment aspect for you to consider is payment: we now only accept contactless payment. Please consider sending an etransfer before your appointment or please add your credit card Information to your patient profile in our Jane booking system - your information is encrypted and we cannot see it. Everything we can do to save time in administrative areas gives you more hands-on time!\n\n • On the day of your appointment, come to the clinic alone (save for reasons of requiring physical assistance or being a minor child) and be sure to follow the Social Distancing signage regarding the stairwell and elevator. You will be asked to wear a mask in the clinic, so if you have one already, please wear it. Walk out onto the outdoor breezeway (second floor) and wait at the laminated sign telling you to do so until your RMT comes to greet you. The RMT will open all doors for you, so that everything remains contactless.\n\n • Your RMT will guide you into the clinic, where you will follow the markings on the floor to your choice of hand sanitizer station or sink for hand-washing. If you did not bring a mask, you will now be given one to put on using your newly-sanitized hands.\n\n • Your RMT will now explain about the transmission of coronavirus via touch, will ensure that you feel empowered to make decisions regarding your own safety, will have you complete a screening and informed consent document, and will decide whether or not treatment can occur. If you are deemed unfit to receive treatment , you will not be charged any fee.\n\n • Your RMT will bring you into the treatment room, perform any interview and assessment necessary, clean the face cradle and arm rests for a second time in your presence, and then leave the room for you to get ready on the table. The fabric treatment room chairs have been removed and plastic chairs are being used instead. Please place any belongings on the plastic chair and the hexagonal table, because these surfaces can be easily sanitized after you leave.\n\n • Your RMT will begin and end each hands-on section of the appointment with handwashing in warm and soapy water for 20+ seconds.\n\n • Since we now only accept contactless payment, at the end of treatment your RMT will charge your credit card for your treatment or ensure that your etransfer has been received, and issue an emailed receipt. No paper receipts will be supplied. If you do not book your own appointments online (preferred, as it saves time), your RMT may also schedule your next appointment at this time.\n\n • Your RMT will leave the room while you get ready, and attend to any sanitizing or laundry that needs to be addressed while you are getting ready to leave the clinic. When you are ready to leave the treatment room, you will open the door using a tissue as a barrier, remove your fabric mask if you are using clinic-supplied re-usable one, and then use hand sanitizer or warm water and soap to clean your hands before leaving. Your RMT will open the door for you to leave.\n\n • After you have left, your RMT will sanitize door handles and any surfaces that were touched, put on gloves to remove the used table linens and fabric face mask putting them either directly into the washer or into a basket for soiled linens only, clean the massage table and its face cradle and armrests.", "pred_label": "__label__1", "pred_score_pos": 0.6867281198501587} {"content": "About Us\n\nWe would like to begin by answering the question “What is saffron ? And then tell you a little more about Zoetic Ltd.\n\nThis delicious aromatic spice comes from the “saffron crocus“. Our farmers painstakingly pick the bright red/purple threads and leave them to dry. Their main use is as a flavouring or colouring in recipes. However, as you will read on this site, there are many other uses. Saffron has the distinction of being the planet’s most expensive spice\n\nWe will also give you a brief history of the spice, explain how it’s grown and share some of our favourite recipes.\n\nIn addition to saffron, our family also imports top quality cinnamon from Sri Lanka and nuts from Iran.\n\n\nMy wife and I have always considered ourselves very lucky to have both grown up in Iranian farming families. Nothing can compare with the freedom and imagination of a child living on a farm.\n\nOf course, we will never forget the very hard work that keeps a farm running. One topic that always got a mention when a group of farmers met was how they were paid less than what they deserved for their product. So, the idea of somehow setting up a better system that would be more favourable to them always lingered at the back of our minds.\n\nVarious friends in the UK frequently asked us where they could buy top quality Iranian produce in London. So, whenever we got the opportunity to go home, we always brought some saffron spice and/or pistachio nuts back for them.\n\nDuring a recent visit back to Iran, a group of small farmers asked if we would be able to sell their produce in the UK. Consequently, it did not take long for us to accept the challenge and here we are!\n\nKeep it in the family.\n\nWe supply only the very best produce. Our saffron (or Persian red gold, as it is sometimes known) is grown in the foothills of Zarand and also in Kerman. The only farmers we work with are our own family and friends from the same small area.\n\nAbove all, we believe in giving more back to our farmers to encourage sustainable farming and environmentally friendly cultivation. We asked them if we could handle all the packaging arrangements and they readily agreed.\n\nSaffron has an extremely subtle and fragrant slightly sweet, luxurious taste\n\nThe Environment\n\nWe take environmental issues very seriously. Therefore, are constantly striving to find new ways of decreasing our carbon footprint. From the word go, we decided to use more biodegradable materials and no plastic, where possible.\n\n\nOne example is that we make our boxes from plain eco-friendly cardboard. They do not have the usual thin plastic coating or prints.\n\nWe realised that once a customer takes the glass jar containing the saffron out of the cardboard box, they will simply throw it away. If it cannot be recycled, then at least we wanted it to be completely biodegradable in a landfill site.\n\nOur Goals\n\nFinally, we plan to work tirelessly towards fulfilling our dreams and objectives about Zoetic Ltd. Our main goals are to keep both our customers and our hard-working farmers 100% satisfied and do whatever we can to make the world a more eco-friendly place.", "pred_label": "__label__1", "pred_score_pos": 0.8086085915565491} {"content": "Network Working Group\nRequest for Comments: 2065\nUpdates: 1034, 1035\nCategory: Standards Track\nD. Eastlake, 3rd\nC. Kaufman\nJanuary 1997\n\nDomain Name System Security Extensions\n\nStatus of this Memo\n\n\n\nThe Domain Name System (DNS) has become a critical operational part of the Internet infrastructure yet it has no strong security mechanisms to assure data integrity or authentication. Extensions to the DNS are described that provide these services to security aware resolvers or applications through the use of cryptographic digital signatures. These digital signatures are included in secured zones as resource records. Security can still be provided even through non-security aware DNS servers in many cases.\n\nThe extensions also provide for the storage of authenticated public keys in the DNS. This storage of keys can support general public key distribution service as well as DNS security. The stored keys enable security aware resolvers to learn the authenticating key of zones in addition to those for which they are initially configured. Keys associated with DNS names can be retrieved to support other protocols. Provision is made for a variety of key types and algorithms.\n\nIn addition, the security extensions provide for the optional authentication of DNS protocol transactions.\n\n\nThe significant contributions of the following persons (in alphabetic order) to this document are gratefully acknowledged:\n\nHarald T. Alvestrand\nMadelyn Badger\nScott Bradner\nMatt Crawford\nJames M. Galvin\nOlafur Gudmundsson\nEdie Gunter\nSandy Murphy\nMasataka Ohta\nMichael A. Patton\nJeffrey I. Schiller\n\nTable of Contents\n\n 2.3.4 Special Considerations at Delegation Points..........7\n 2.3.5 Special Considerations with CNAME RRs................8\n 3.5 The KEY Algorithm Number and the MD5/RSA Algorithm....13\n 3.6 Interaction of Flags, Algorithm, and Protocol Bytes...14\n 3.8 File Representation of KEY RRs........................16\n 4.1.2 MD5/RSA Algorithm Signature Calculation.............20\n 4.1.3 Zone Transfer (AXFR) SIG............................21\n 4.4 Signature Expiration, TTLs, and Validity..............24\n 4.5 File Representation of SIG RRs........................25\n 5.4 Interaction of NXT RRs and Wildcard RRs...............28\n 5.5 Blocking NXT Pseudo-Zone Transfers....................29\n 5.6 Special Considerations at Delegation Points...........29\n 6. The AD and CD Bits and How to Resolve Securely.........30\n\n1. Overview of Contents\n\nThis document describes extensions of the Domain Name System (DNS) protocol to support DNS security and public key distribution. It assumes that the reader is familiar with the Domain Name System, particularly as described in RFCs 1033, 1034, and 1035.\n\n\nSection 3 discusses the KEY resource record, its structure, use in DNS responses, and file representation. These resource records represent the public keys of entities named in the DNS and are used for key distribution.\n\nSection 4 discusses the SIG digital signature resource record, its structure, use in DNS responses, and file representation. These resource records are used to authenticate other resource records in the DNS and optionally to authenticate DNS transactions and requests.\n\nSection 5 discusses the NXT resource record and its use in DNS responses. The NXT RR permits authenticated denial in the DNS of the existence of a name or of a particular type for an existing name.\n\nSection 6 discusses how a resolver can be configured with a starting key or keys and proceed to securely resolve DNS requests. Interactions between resolvers and servers are discussed for all combinations of security aware and security non-aware. Two additional query header bits are defined for signaling between resolvers and servers.\n\nSection 7 reviews a variety of operational considerations including key generation, lifetime, and storage.\n\nSection 8 defines levels of conformance for resolvers and servers.\n\nSection 9 provides a few paragraphs on overall security considerations.\n\nAn Appendix is provided that gives details of base 64 encoding which is used in the file representation of some RR's defined in this document.\n\n2. Overview of the DNS Extensions\n\n\n\n2.1 Services Not Provided\n\n\n\nIn addition, no effort has been made to provide for any confidentiality for queries or responses. (This service may be available via IPSEC [RFC 1825].)\n\n2.2 Key Distribution\n\nResource records (RRs) are defined to associate keys with DNS names. This permits the DNS to be used as a public key distribution mechanism in support of the DNS data origin authentication and other security services.\n\nThe syntax of a KEY resource record (RR) is described in Section 3. It includes an algorithm identifier, the actual public key parameters, and a variety of flags including those indicating the type of entity the key is associated with and/or asserting that there is no key associated with that entity.\n\nUnder conditions described in Section 3.7, security aware DNS servers will automatically attempt to return KEY resources as additional information, along with those resource records actually requested, to minimize the number of queries needed.\n\n2.3 Data Origin Authentication and Integrity\n\nAuthentication is provided by associating with resource records in the DNS cryptographically generated digital signatures. Commonly, there will be a single private key that signs for an entire zone. If a security aware resolver reliably learns the public key of the zone, it can verify, for signed data read from that zone, that it was properly authorized and is reasonably current. The expected implementation is for the zone private key to be kept off-line and used to re-sign all of the records in the zone periodically.\n\nThis data origin authentication key belongs to the zone and not to the servers that store copies of the data. That means compromise of a server or even all servers for a zone will not necessarily affect the degree of assurance that a resolver has that it can determine whether data is genuine.\n\nA resolver can learn the public key of a zone either by reading it from DNS or by having it staticly configured. To reliably learn the public key by reading it from DNS, the key itself must be signed. Thus, to provide a reasonable degree of security, the resolver must be configured with at least the public key of one zone that it can use to authenticate signatures. From there, it can securely read the public keys of other zones, if the intervening zones in the DNS tree are secure and their signed keys accessible. (It is in principle more secure to have the resolver manually configured with the public keys of multiple zones, since then the compromise of a single zone would not permit the faking of information from other zones. It is also more administratively cumbersome, however, particularly when public keys change.)\n\nAdding data origin authentication and integrity requires no change to the \"on-the-wire\" DNS protocol beyond the addition of the signature resource type and, as a practical matter, the key resource type needed for key distribution. This service can be supported by existing resolver and server implementations so long as they can support the additional resource types (see Section 8). The one exception is that CNAME referrals from a secure zone can not be authenticated if they are from non-security aware servers (see Section 2.3.5).\n\nIf signatures are always separately retrieved and verified when retrieving the information they authenticate, there will be more trips to the server and performance will suffer. To avoid this, security aware servers mitigate that degradation by always attempting to send the signature(s) needed.\n\n2.3.1 The SIG Resource Record\n\nThe syntax of a SIG resource record (signature) is described in Section 4. It includes the type of the RR(s) being signed, the name of the signer, the time at which the signature was created, the time it expires (when it is no longer to be believed), its original time to live (which may be longer than its current time to live but cannot be shorter), the cryptographic algorithm in use, and the actual signature.\n\nEvery name in a secured zone will have associated with it at least one SIG resource record for each resource type under that name except for glue RRs and delgation point NS RRs. A security aware server supporting the performance enhanced version of the DNS protocol security extensions will attempt to return, with RRs retrieved, the corresponding SIGs. If a server does not support the protocol, the resolver must retrieve all the SIG records for a name and select the one or ones that sign the resource record(s) that resolver is interested in.\n\n2.3.2 Authenticating Name and Type Non-existence\n\nThe above security mechanism provides only a way to sign existing RRs in a zone. \"Data origin\" authentication is not obviously provided for the non-existence of a domain name in a zone or the non-existence of a type for an existing name. This gap is filled by the NXT RR which authenticatably asserts a range of non-existent names in a zone and the non-existence of types for the name just before that range.\n\nSection 5 below covers the NXT RR.\n\n2.3.3 Special Considerations With Time-to-Live\n\nA digital signature will fail to verify if any change has occurred to the data between the time it was originally signed and the time the signature is verified. This conflicts with our desire to have the time-to-live field tick down when resource records are cached.\n\nThis could be avoided by leaving the time-to-live out of the digital signature, but that would allow unscrupulous servers to set arbitrarily long time to live values undetected. Instead, we include the \"original\" time-to-live in the signature and communicate that data in addition to the current time-to-live. Unscrupulous servers under this scheme can manipulate the time to live but a security aware resolver will bound the TTL value it uses at the original signed value. Separately, signatures include a time signed and an expiration time. A resolver that knows the absolute time can determine securely whether a signature has expired. It is not possible to rely solely on the signature expiration as a substitute for the TTL, however, since the TTL is primarily a database consistency mechanism and, in any case, non-security aware servers that depend on TTL must still be supported.\n\n2.3.4 Special Considerations at Delegation Points\n\nDNS security would like to view each zone as a unit of data completely under the control of the zone owner and signed by the zone's key. But the operational DNS views the leaf nodes in a zone, which are also the apex nodes of a subzone (i.e., delegation points), as \"really\" belonging to the subzone. These nodes occur in two master files and may have RRs signed by both the upper and lower zone's keys. A retrieval could get a mixture of these RRs and SIGs, especially since one server could be serving both the zone above and below a delegation point.\n\nIn general, there must be a zone KEY RR for the subzone in the superzone and the copy signed in the superzone is controlling. For all but one other RR type that should appearing in both the superzone and subzone, the data from the subzone is more authoritative. To avoid conflicts, only the KEY RR in the superzone should be signed and the NS and any A (glue) RRs should only be signed in the subzone. The SOA and any other RRs that have the zone name as owner should appear only in the subzone and thus are signed there. The NXT RR type is an exceptional case that will always appear differently and authoritatively in both the superzone and subzone, if both are secure, as described in Section 5.\n\n2.3.5 Special Considerations with CNAME RRs\n\nThere is a significant problem when security related RRs with the same owner name as a CNAME RR are retrieved from a non-security-aware server. In particular, an initial retrieval for the CNAME or any other type will not retrieve any associated signature, key, or NXT RR. For types other than CNAME, it will retrieve that type at the target name of the CNAME (or chain of CNAMEs) and will return the CNAME as additional information. In particular, a specific retrieval for type SIG will not get the SIG, if any, at the original CNAME domain name but rather a SIG at the target name.\n\nIn general, security aware servers MUST be used to securely CNAME in DNS. Security aware servers must (1) allow KEY, SIG, and NXT RRs along with CNAME RRs, (2) suppress CNAME processing on retrieval of these types as well as on retrieval of the type CNAME, and (3) automatically return SIG RRs authenticating the CNAME or CNAMEs encountered in resolving a query. This is a change from the previous DNS standard which prohibited any other RR type at a node where a CNAME RR was present.\n\n2.3.6 Signers Other Than The Zone\n\nThere are two cases where a SIG resource record is signed by other than the zone private key. One is for support of dynamic update where an entity is permitted to authenticate/update its own records. The public key of the entity must be present in the DNS and be appropriately signed but the other RR(s) may be signed with the entity's key. The other is for support of transaction and request authentication as described in Section 2.4 immediately below.\n\n2.4 DNS Transaction and Request Authentication\n\nThe data origin authentication service described above protects retrieved resource records but provides no protection for DNS requests or for message headers.\n\nIf header bits are falsely set by a server, there is little that can be done. However, it is possible to add transaction authentication. Such authentication means that a resolver can be sure it is at least getting messages from the server it thinks it queried, that the response is from the query it sent, and that these messages have not been diddled in transit. This is accomplished by optionally adding a special SIG resource record at the end of the reply which digitally signs the concatenation of the server's response and the resolver's query.\n\nRequests can also be authenticated by including a special SIG RR at the end of the request. Authenticating requests serves no function in the current DNS and requests with a non-empty additional information section are ignored by almost all current DNS servers. However, this syntax for signing requests is defined in connection with authenticating future secure dynamic update requests or the like.\n\nThe private keys used in transaction and request security belongs to the host composing the request or reply message, not to the zone involved. The corresponding public key is normally stored in and retrieved from the DNS.\n\n\n3. The KEY Resource Record\n\nThe KEY resource record (RR) is used to document a key that is associated with a Domain Name System (DNS) name. It will be a public key as only public keys are stored in the DNS. This can be the public key of a zone, a host or other end entity, or a user. A KEY RR is, like any other RR, authenticated by a SIG RR. Security aware DNS implementations MUST be designed to handle at least two simultaneously valid keys of the same type associated with a name.\n\nThe type number for the KEY RR is 25.\n\n3.1 KEY RDATA format\n\nThe RDATA for a KEY RR consists of flags, a protocol octet, the algorithm number, and the public key itself. The format is as follows:\n\n | flags | protocol | algorithm |\n | /\n / public key /\n / /\n\nThe meaning of the KEY RR owner name, flags, and protocol octet are described in Sections 3.2, 3.3 and 3.4 below respectively. The flags and algorithm must be examined before any data following the algorithm octet as they control the format and even whether there is any following data. The algorithm and public key fields are described in Section 3.5. The format of the public key is algorithm dependent.\n\n3.2 Object Types, DNS Names, and Keys\n\nThe public key in a KEY RR belongs to the object named in the owner name.\n\nThis DNS name may refer to up to three different categories of things. For example, dee.cybercash.com could be (1) a zone, (2) a host or other end entity , and (3) the mapping into a DNS name of the user or account dee@cybercash.com. Thus, there are flags, as described below, in the KEY RR to indicate with which of these roles the owner name and public key are associated. Note that an appropriate zone KEY RR MUST occur at the apex node of a secure zone and at every leaf node which is a delegation point (and thus the same owner name as the apex of a subzone) within a secure zone.\n\nAlthough the same name can be used for up to all three of these categories, such overloading of a name is discouraged. It is also possible to use the same key for different things with the same name or even different names, but this is strongly discouraged. In particular, the use of a zone key as a non-zone key will usually require that the corresponding private key be kept on line and thereby become more vulnerable.\n\nIn addition to the name type bits, there are additional flag bits including the \"type\" field, \"experimental\" bit, \"signatory\" field, etc., as described below.\n\n3.3 The KEY RR Flag Field\n\nIn the \"flags\" field:\n\n Bit 0 and 1 are the key \"type\" field. Bit 0 a one indicates\n that use of the key is prohibited for authentication. Bit 1 a one\n indicates that use of the key is prohibited for confidentiality. If\n this field is zero, then use of the key for authentication and/or\n confidentiality is permitted. Note that DNS security makes use of\n keys for authentication only. Confidentiality use flagging is\n provided for use of keys in other protocols. Implementations not\n intended to support key distribution for confidentiality MAY require\n that the confidentiality use prohibited bit be on for keys they\n serve. If both bits of this field are one, the \"no key\" value, there\n is no key information and the RR stops after the algorithm octet. By\n the use of this \"no key\" value, a signed KEY RR can authenticatably\n assert that, for example, a zone is not secured.\n Bit 2 is the \"experimental\" bit. It is ignored if the type\n field indicates \"no key\" and the following description assumes that\n type field to be non-zero. Keys may be associated with zones,\n entities, or users for experimental, trial, or optional use, in which\n case this bit will be one. If this bit is a zero, it means that the\n use or availability of security based on the key is \"mandatory\".\n Thus, if this bit is off for a zone key, the zone should be assumed\n secured by SIG RRs and any responses indicating the zone is not\n secured should be considered bogus. If this bit is a one for a host\n or end entity, it might sometimes operate in a secure mode and at\n other times operate without security. The experimental bit, like all\n other aspects of the KEY RR, is only effective if the KEY RR is\n appropriately signed by a SIG RR. The experimental bit must be zero\n for safe secure operation and should only be a one for a minimal\n transition period.\n\nBits 3-4 are reserved and must be zero.\n\n Bit 5 on indicates that this is a key associated with a \"user\"\n or \"account\" at an end entity, usually a host. The coding of the\n owner name is that used for the responsible individual mailbox in the\n SOA and RP RRs: The owner name is the user name as the name of a node\n under the entity name. For example, \"j.random_user\" on\n host.subdomain.domain could have a public key associated through a\n KEY RR with name j\\.random_user.host.subdomain.domain and the user\n bit a one. It could be used in an security protocol where\n\nauthentication of a user was desired. This key might be useful in IP or other security for a user level service such a telnet, ftp, rlogin, etc.\n\n Bit 6 on indicates that this is a key associated with the non-\n zone \"entity\" whose name is the RR owner name. This will commonly be\n a host but could, in some parts of the DNS tree, be some other type\n of entity such as a telephone number [RFC 1530]. This is the public\n key used in connection with the optional DNS transaction\n authentication service if the owner name is a DNS server host. It\n could also be used in an IP-security protocol where authentication of\n at the host, rather than user, level was desired, such as routing,\n NTP, etc.\n Bit 7 is the \"zone\" bit and indicates that this is a zone key\n for the zone whose name is the KEY RR owner name. This is the public\n key used for DNS data origin authentication.\n Bit 8 is reserved to be the IPSEC [RFC 1825] bit and indicates\n that this key is valid for use in conjunction with that security\n standard. This key could be used in connection with secured\n communication on behalf of an end entity or user whose name is the\n owner name of the KEY RR if the entity or user bits are on. The\n presence of a KEY resource with the IPSEC and entity bits on and\n experimental and no-key bits off is an assertion that the host speaks\n Bit 9 is reserved to be the \"email\" bit and indicate that this\n key is valid for use in conjunction with MIME security multiparts.\n This key could be used in connection with secured communication on\n behalf of an end entity or user whose name is the owner name of the\n KEY RR if the entity or user bits are on.\n\nBits 10-11 are reserved and must be zero.\n\n indicate that the key can validly sign RRs or updates of the same\n name. If the owner name is a wildcard, then RRs or updates with any\n name which is in the wildcard's scope can be signed. Fifteen\n different non-zero values are possible for this field and any\n differences in their meaning are reserved for definition in\n connection with DNS dynamic update or other new DNS commands. Zone\n keys always have authority to sign any RRs in the zone regardless of\n the value of this field. The signatory field, like all other aspects\n of the KEY RR, is only effective if the KEY RR is appropriately\n signed by a SIG RR.\n\n3.4 The Protocol Octet\n\nIt is anticipated that some keys stored in DNS will be used in conjunction with Internet protocols other than DNS (keys with zone bit or signatory field non-zero) and IPSEC/email (keys with IPSEC and/or email bit set). The protocol octet is provided to indicate that a key is valid for such use and, for end entity keys or the host part of user keys, that the secure version of that protocol is implemented on that entity or host.\n\nValues between 1 and 191 decimal inclusive are available for assignment by IANA for such protocols. The 63 values between 192 and 254 inclusive will not be assigned to a specific protocol and are available for experimental use under bilateral agreement. Value 0 indicates, for a particular key, that it is not valid for any particular additional protocol beyond those indicated in the flag field. And value 255 indicates that the key is valid for all assigned protocols (those in the 1 to 191 range).\n\nIt is intended that new uses of DNS stored keys would initially be implemented, and operational experience gained, using the experimental range of the protocol octet. If demand for widespread deployment for the indefinite future warrants, a value in the assigned range would then be designated for the protocol. Finally, (1) should the protocol become so widespread in conjunction with other protocols and with which it shares key values that duplicate RRs are a serious burden and (2) should the protocol provide substantial facilities not available in any protocol for which a flags field bit has been allocated, then one of the remaining flag field bits may be allocated to the protocol. When such a bit has been allocated, a key can be simultaneously indicated as valid for that protocol and the entity or host can be simultaneously flagged as implementing the secure version of that protocol, along with other protocols for which flag field bits have been assigned.\n\n3.5 The KEY Algorithm Number and the MD5/RSA Algorithm\n\nThis octet is the key algorithm parallel to the same field for the SIG resource. The MD5/RSA algorithm described in this document is number 1. Numbers 2 through 252 are available for assignment should sufficient reason arise. However, the designation of a new algorithm could have a major impact on interoperability and requires an IETF standards action. Number 254 is reserved for private use and will never be assigned a specific algorithm. For number 254, the public key area shown in the packet diagram above will actually begin with a length byte followed by an Object Identifier (OID) of that length. The OID indicates the private algorithm in use and the remainder of the area is whatever is required by that algorithm. Number 253 is reserved as the \"expiration date algorithm\" for use where the expiration date or other labeling fields of SIGs are desired without any actual security. It is anticipated that this algorithm will only be used in connection with some modes of DNS dynamic update. For number 253, the public key area is null. Values 0 and 255 are reserved.\n\nIf the type field does not have the \"no key\" value and the algorithm field is 1, indicating the MD5/RSA algorithm, the public key field is structured as follows:\n\n | pub exp length| public key exponent /\n | /\n +- modulus /\n | /\n\nTo promote interoperability, the exponent and modulus are each limited to 2552 bits in length. The public key exponent is a variable length unsigned integer. Its length in octets is represented as one octet if it is in the range of 1 to 255 and by a zero octet followed by a two octet unsigned length if it is longer than 255 bytes. The public key modulus field is a multiprecision unsigned integer. The length of the modulus can be determined from the RDLENGTH and the preceding RDATA fields including the exponent. Leading zero bytes are prohibited in the exponent and modulus.\n\n3.6 Interaction of Flags, Algorithm, and Protocol Bytes\n\nVarious combinations of the no-key type value, algorithm byte, protocol byte, and any protocol indicating flags (such as the reserved IPSEC flag) are possible. (Note that the zone flag bit being on or the signatory field being non-zero is effectively a DNS protocol flag on.) The meaning of these combinations is indicated below:\n\nNK = no key type value\nAL = algorithm byte\nPR = protocols indicated by protocol byte or protocol flags\n\nx represents any valid non-zero value(s).\n\n AL PR NK Meaning\n 0 0 1 Specifies total lack of security for owner.\n 0 x 1 Specified protocols insecure, others may be secure.\n x 0 0 Useless. Gives key but no protocols to use it.\n x 0 1 Useless. Denies key but for no protocols.\n x x 0 Specifies key for protocols and asserts that\n those protocols are implemented with security.\n x x 1 Algorithm not understood for protocol.\n\n(remember, in reference to the above table, that a protocol\n\nbyte of 255 means all protocols with protocol byte values assigned)\n\n3.7 KEY RRs in the Construction of Responses\n\n\nSecurity aware DNS servers MUST include KEY RRs as additional information in responses where appropriate including the following:\n\n(1) On the retrieval of NS RRs, the zone key KEY RR(s) for the zone served by these name servers MUST be included as additional information if space is avilable. There will always be at least one such KEY RR in a secure zone, even if it has the no-key type value to indicate that the subzone is insecure. If not all additional information will fit, the KEY RR(s) have higher priority than type A or AAAA glue RRs. If such a KEY RR does not fit on a retrieval, the retrieval must be considered truncated.\n\n(2) On retrieval of type A or AAAA RRs, the end entity KEY RR(s) MUST be included if space is available. On inclusion of A or AAAA RRs as additional information, their KEY RRs will also be included but with lower priority than the relevant A or AAAA RRs.\n\n3.8 File Representation of KEY RRs\n\nKEY RRs may appear as lines in a zone data master file.\n\nThe flag field, protocol, and algorithm number octets are then represented as unsigned integers. Note that if the type field has the \"no key\" value or the algorithm specified is 253, nothing appears after the algorithm octet.\n\nThe remaining public key portion is represented in base 64 (see Appendix) and may be divided up into any number of white space separated substrings, down to single base 64 digits, which are concatenated to obtain the full signature. These substrings can span lines using the standard parenthesis.\n\n\n4. The SIG Resource Record\n\n\nThe SIG RR unforgably authenticates other RRs of a particular type, class, and name and binds them to a time interval and the signer's domain name. This is done using cryptographic techniques and the signer's private key. The signer is frequently the owner of the zone from which the RR originated.\n\n4.1 SIG RDATA Format\n\n\n | type covered | algorithm | labels |\n | original TTL |\n | signature expiration |\n | time signed |\n | key footprint | /\n / /\n | /\n +- signature /\n / /\n\nThe value of the SIG RR type is 24.\n\n\nThe algorithm number is an octet specifying the digital signature algorithm used parallel to the algorithm octet for the KEY RR. The MD5/RSA algorithm described in this document is number 1. Numbers 2 through 252 are available for assignment should sufficient reason arise to allocate them. However, the designation of a new algorithm could have a major impact on the interoperability of the global DNS system and requires an IETF standards action. Number 254 is reserved for private use and will not be assigned a specific algorithm. For number 254, the \"signature\" area shown above will actually begin with a length byte followed by an Object Identifier (OID) of that length. The OID indicates the private algorithm in use and the remainder of the area is whatever is required by that algorithm. Number 253, known as the \"expiration date algorithm\", is used when the expiration date or other non-signature fields of the SIG are desired without any actual security. It is anticipated that this algorithm will only be used in connection with some modes of DNS dynamic update. For number 253, the signature field will be null. Values 0 and 255 are reserved.\n\nThe \"labels\" octet is an unsigned count of how many labels there are in the original SIG RR owner name not counting the null label for root and not counting any initial \"*\" for a wildcard. If a secured retrieval is the result of wild card substitution, it is necessary for the resolver to use the original form of the name in verifying the digital signature. This field helps optimize the determination of the original form thus reducing the effort in authenticating signed data.\n\n\n .| . | bad | bad | bad | bad |\n\n\n the signature is verified. This implies that all RRs for a\n particular type, name, and class must have the same TTL to start\n\nThe SIG is valid until the \"signature expiration\" time which is an unsigned number of seconds since the start of 1 January 1970, GMT, ignoring leap seconds. (See also Section 4.4.) SIG RRs should not have a date signed significantly in the future. To prevent misordering of network requests to update a zone dynamically, monotonically increasing \"time signed\" dates may be necessary.\n\nThe \"time signed\" field is an unsigned number of seconds since the start of 1 January 1970, GMT, ignoring leap seconds.\n\nA SIG RR with an expiration date before the time signed must be considered corrupt and ignored.\n\nThe \"key footprint\" is a 16 bit quantity that is used to help efficiently select between multiple keys which may be applicable and as a quick check that a public key about to be used for the computationally expensive effort to check the signature is possibly valid. Its exact meaning is algorithm dependent. For the MD5/RSA algorithm, it is the next to the bottom two octets of the public key modulus needed to decode the signature field. That is to say, the most significant 16 of the lest significant 24 bits of the modulus in network order.\n\nThe \"signer's name\" field is the domain name of the signer generating the SIG RR. This is the owner of the public KEY RR that can be used to verify the signature. It is frequently the zone which contained the RR(s) being authenticated. The signer's name may be compressed with standard DNS name compression when being transmitted over the network.\n\nThe structure of the \"signature\" field is described below.\n\n4.1.1 Signature Data\n\nExcept for algorithm number 253 where it is null, the actual signature portion of the SIG RR binds the other RDATA fields to all of the \"type covered\" RRs with that owner name and class. These covered RRs are thereby authenticated. To accomplish this, a data sequence is constructed as follows:\n\ndata = RDATA | RR(s)...\n\nwhere \"|\" is concatenation, RDATA is all the RDATA fields in the SIG RR itself before and not including the signature, and RR(s) are all the RR(s) of the type covered with the same owner name and class as the SIG RR in canonical form and order. How this data sequence is processed into the signature is algorithm dependent.\n\nFor purposes of DNS security, the canonical form for an RR is the RR with domain names (1) fully expanded (no name compression via pointers), (2) all domain name letters set to lower case, and (3) the original TTL substituted for the current TTL.\n\nFor purposes of DNS security, the canonical order for RRs is to sort them in ascending order by name, considering labels as a left justified unsigned octet sequence in network (transmission) order where a missing octet sorts before a zero octet. (See also ordering discussion in Section 5.1.) Within any particular name they are similarly sorted by type and then RDATA as a left justified unsigned octet sequence. EXCEPT that the type SIG RR(s) covering any particular type appear immediately after the other RRs of that type. (This special consideration for SIG RR(s) in ordering really only applies to calculating the AXFR SIG RR as explained in section 4.1.3 below.) Thus if at name a.b there are two A RRs and one KEY RR, their order with SIGs for concatenating the \"data\" to be signed would be as follows:\n\n a.b. A ....\n a.b. A ....\n a.b. SIG A ...\n a.b. KEY ...\n a.b. SIG KEY ...\n\nSIGs covering type ANY should not be included in a zone.\n\n4.1.2 MD5/RSA Algorithm Signature Calculation\n\nFor the MD5/RSA algorithm, the signature is as follows\n\n hash = MD5 ( data )\n where MD5 is the message digest algorithm documented in RFC 1321, \"|\"\n ASN.1 BER MD5 algorithm designator prefix specified in PKCS1, that\n hex 3020300c06082a864886f70d020505000410 [NETSEC].\n This prefix is included to make it easier to use RSAREF or similar\n packages. The FF octet is repeated the maximum number of times such\n that the value of the quantity being exponentiated is one octet\n shorter than the value of n.\n\n(The above specifications are identical to the corresponding part of Public Key Cryptographic Standard #1 [PKCS1].)\n\nThe size of n, including most and least significant bits (which will be 1) SHALL be not less than 512 bits and not more than 2552 bits. n and e SHOULD be chosen such that the public exponent is small.\n\nLeading zeros bytes are not permitted in the MD5/RSA algorithm signature.\n\nA public exponent of 3 minimizes the effort needed to decode a signature. Use of 3 as the public exponent may be weak for confidentiality uses since, if the same data can be collected encrypted under three different keys with an exponent of 3 then, using the Chinese Remainder Theorem, the original plain text can be easily recovered. This weakness is not significant for DNS because we seek only authentication, not confidentiality.\n\n4.1.3 Zone Transfer (AXFR) SIG\n\nThe above SIG mechanisms assure the authentication of all zone signed RRs of a particular name, class and type. However, to efficiently assure the completeness and security of zone transfers, a SIG RR owned by the zone name must be created with a type covered of AXFR that covers all zone signed RRs in the zone and their zone SIGs but not the SIG AXFR itself. The RRs are ordered and concatenated for hashing as described in Section 4.1.1. (See also ordering discussion in Section 5.1.)\n\nThe AXFR SIG must be calculated last of all zone key signed SIGs in the zone. In effect, when signing the zone, you order, as described above, all RRs to be signed by the zone, and all associated glue RRs and delegation point NS RRs. You can then make one pass inserting all the zone SIGs. As you proceed you hash RRs to be signed into both an RRset hash and the zone hash. When the name or type changes you calculate and insert the RRset zone SIG, clear the RRset hash, and hash that SIG into the zone hash (note that glue RRs and delegation point NSs are not zone signed but zone apex NSs are). When you have finished processing all the starting RRs as described above, you can then use the cumulative zone hash RR to calculate and insert an AXFR SIG covering the zone. Of course any computational technique producing the same results as above is permitted.\n\nThe AXFR SIG really belongs to the zone as a whole, not to the zone name. Although it should be correct for the zone name, the labels field of an AXFR SIG is otherwise meaningless. The AXFR SIG is only retrieved as part of a zone transfer. After validation of the AXFR SIG, the zone MAY be considered valid without verification of the internal zone signed SIGs in the zone; however, any RRs authenticated by SIGs signed by entity keys or the like MUST still be validated. The AXFR SIG SHOULD be transmitted first in a zone transfer so the receiver can tell immediately that they may be able to avoid verifying other zone signed SIGs.\n\nRRs which are authenticated by a dynamic update key and not by the zone key (see Section 3.2) are not included in the AXFR SIG. They may originate in the network and might not, in general, be migrated to the recommended off line zone signing procedure (see Section 7.2). Thus, such RRs are not directly signed by the zone, are not included in the AXFR SIG, and are protected against omission from zone transfers only to the extent that the server and communication can be trusted.\n\n4.1.4 Transaction and Request SIGs\n\nA response message from a security aware server may optionally contain a special SIG as the last item in the additional information section to authenticate the transaction.\n\nThis SIG has a \"type covered\" field of zero, which is not a valid RR type. It is calculated by using a \"data\" (see Section 4.1.2) of the entire preceding DNS reply message, including DNS header but not the IP header, concatenated with the entire DNS query message that produced this response, including the query's DNS header but not its IP header. That is\n\ndata = full response (less final transaction SIG) | full query\n\n\nA DNS request may be optionally signed by including one or more SIGs at the end of the query. Such SIGs are identified by having a \"type covered\" field of zero. They sign the preceding DNS request message including DNS header but not including the IP header or at the begining or any preceding request SIGs at the end. Such request SIGs are included in the \"data\" used to form any optional response transaction SIG.\n\nWARNING: Request SIGs are unnecessary for currently defined queries and will cause almost all existing DNS servers to completely ignore a query. However, such SIGs may be needed to authenticate future DNS secure dynamic update or other requests.\n\n4.2 SIG RRs in the Construction of Responses\n\nSecurity aware DNS servers MUST, for every authoritative RR the query will return, attempt to send the available SIG RRs which authenticate the requested RR. The following rules apply to the inclusion of SIG RRs in responses:\n\n 1. when an RR set is placed in a response, its SIG RR has a higher priority for inclusion than other additional RRs that may need to be included. If space does not permit its inclusion, the response MUST be considered truncated except as provided in 2 below.\n 1. when a SIG RR is present in the zone for an additional information section RR, the response MUST NOT be considered truncated merely because space does not permit the inclusion of its SIG RR.\n 1. SIGs to authenticate non-authoritative data (glue records and NS RRs for subzones) are unnecessary and MUST NOT be sent. (Note that KEYs for subzones are controlling in a superzone so the superzone's signature on the KEY MUST be included (unless the KEY was additional information and the SIG did not fit).)\n 1. If a SIG covers any RR that would be in the answer section of the response, its automatic inclusion MUST be the answer section. If it covers an RR that would appear in the authority section, its automatic inclusion MUST be in the authority section. If it covers an RR that would appear in the additional information section it MUST appear in the additional information section. This is a change in the existing standard which contemplates only NS and SOA RRs in the authority section.\n 1. Optionally, DNS transactions may be authenticated by a SIG RR at the end of the response in the additional information section (Section 4.1.4). Such SIG RRs are signed by the DNS server originating the response. Although the signer field MUST be the name of the originating server host, the owner name, class, TTL, and original TTL, are meaningless. The class and TTL fields SHOULD be zero. To conserve space, the owner name SHOULD be root (a single zero octet). If transaction authentication is desired, that SIG RR must be considered higher priority for inclusion than any other RR in the response.\n\n4.3 Processing Responses and SIG RRs\n\n\n 1. a security aware resolver that receives a response from what it believes to be a security aware server via a secure communication with the AD bit (see Section 6.1) set, MAY choose to accept the RRs as received without verifying the zone SIG RRs.\n 1. in other cases, a security aware resolver SHOULD verify the SIG RRs for the RRs of interest. This may involve initiating additional queries for SIG or KEY RRs, especially in the case of getting a response from an insecure server. (As explained in 4.2 above, it will not be possible to secure CNAMEs being served up by non-secure resolvers.)\n\n\n\nIf the message does not pass reasonable checks or the SIG does not check against the signed RRs, the SIG RR is invalid and should be ignored. If all of the SIG RR(s) purporting to authenticate a set of RRs are invalid, then the set of RR(s) is not authenticated.\n\nIf the SIG RR is the last RR in a response in the additional information section and has a type covered of zero, it is a transaction signature of the response and the query that produced the response. It MAY be optionally checked and the message rejected if the checks fail. But even if the checks succeed, such a transaction authentication SIG does NOT authenticate any RRs in the message. Only a proper SIG RR signed by the zone or a key tracing its authority to the zone or to static resolver configuration can authenticate RRs. If a resolver does not implement transaction and/or request SIGs, it MUST ignore them without error.\n\nIf all reasonable checks indicate that the SIG RR is valid then RRs verified by it should be considered authenticated.\n\n4.4 Signature Expiration, TTLs, and Validity\n\nSecurity aware servers must not consider SIG RRs to authenticate anything after their expiration time and not consider any RR to be authenticated after its signatures have expired. Within that constraint, servers should continue to follow DNS TTL aging. Thus authoritative servers should continue to follow the zone refresh and expire parameters and a non-authoritative server should count down the TTL and discard RRs when the TTL is zero. In addition, when RRs are transmitted in a query response, the TTL should be trimmed so that current time plus the TTL does not extend beyond the signature expiration time. Thus, in general, the TTL on an transmitted RR would be\n\n\n4.5 File Representation of SIG RRs\n\nA SIG RR can be represented as a single logical line in a zone data file [RFC1033] but there are some special considerations as described below. (It does not make sense to include a transaction or request authenticating SIG RR in a file as they are a transient authentication that covers data including an ephemeral transaction number and so must be calculated in real time.)\n\n\nThe original TTL and algorithm fields appear as unsigned integers.\n\n\nThe \"labels\" field does not appear in the file representation as it can be calculated from the owner name.\n\nThe key footprint appears as an unsigned decimal number.\n\n\n5. Non-existent Names and Types\n\nThe SIG RR mechanism described in Section 4 above provides strong authentication of RRs that exist in a zone. But is it not clear above how to authenticatably deny the existence of a name in a zone or a type for an existent name.\n\nThe nonexistence of a name in a zone is indicated by the NXT (\"next\") RR for a name interval containing the nonexistent name. A NXT RR and its SIG are returned in the authority section, along with the error, if the server is security aware. The same is true for a non-existent type under an existing name. This is a change in the existing standard which contemplates only NS and SOA RRs in the authority section. NXT RRs will also be returned if an explicit query is made for the NXT type.\n\nThe existence of a complete set of NXT records in a zone means that any query for any name and any type to a security aware server serving the zone will always result in an reply containing at least one signed RR.\n\nNXT RRs do not appear in zone master files since they can be derived from the rest of the zone.\n\n5.1 The NXT Resource Record\n\nThe NXT resource record is used to securely indicate that RRs with an owner name in a certain name interval do not exist in a zone and to indicate what zone signed RR types are present for an existing name.\n\nThe owner name of the NXT RR is an existing name in the zone. It's RDATA is a \"next\" name and a type bit map. The presence of the NXT RR means that generally no name between its owner name and the name in its RDATA area exists and that no other zone signed types exist under its owner name. This implies a canonical ordering of all domain names in a zone.\n\nThe ordering is to sort labels as unsigned left justified octet strings where the absence of a octet sorts before a zero value octet and upper case letters are treated as lower case letters. Names are then sorted by sorting on the highest level label and then, within those names with the same highest level label by the next lower label, etc. down to leaf node labels. Since we are talking about a zone, the zone name itself always exists and all other names are the zone name with some prefix of lower level labels. Thus the zone name itself always sorts first.\n\n\nThere are special considerations due to interaction with wildcards as explained below.\n\nThe NXT RRs for a zone SHOULD be automatically calculated and added to the zone by the same recommended off-line process that signs the zone (see Section 7.2). The NXT RR's TTL SHOULD not exceed the zone minimum TTL.\n\n5.2 NXT RDATA Format\n\n\nThe type number for the NXT RR is 30.\n\n | next domain name /\n | type bit map /\n\nThe NXT RR type bit map is one bit per RR type present for the owner name similar to the WKS socket bit map. The first bit represents RR type zero (an illegal type which should not be present.) A one bit indicates that at least one RR of that type is present for the owner name. A zero indicates that no such RR is present. All bits not specified because they are beyond the end of the bit map are assumed to be zero. Note that bit 30, for NXT, will always be on so the minimum bit map length is actually four octets. The NXT bit map should be printed as a list of RR type mnemonics or decimal numbers similar to the WKS RR.\n\n\n5.3 Example\n\nAssume zone foo.tld has entries for\n\n\nThen a query to a security aware server for huge.foo.tld would produce an error reply with the authority section data including something like the following:\n\n big.foo.tld. NXT medium.foo.tld. A MX SIG NXT\n 19960102030405 ;signature expiration\n 19951211100908 ;time signed\n 21435 ;key footprint\n foo.tld. ;signer\n\nNote that this response implies that big.foo.tld is an existing name in the zone and thus has other RR types associated with it than NXT. However, only the NXT (and its SIG) RR appear in the response to this query for huge.foo.tld, which is a non-existent name.\n\n5.4 Interaction of NXT RRs and Wildcard RRs\n\nSince, in some sense, a wildcard RR causes all possible names in an interval to exist, there should not be an NXT RR that would cover any part of this interval. Thus if *.X.ZONE exists you would expect an NXT RR that ends at X.ZONE and one that starts with the last name covered by *.X.ZONE. However, this \"last name covered\" is something very ugly and long like \\255\\255\\255....X.zone. So the NXT for the interval following is simply given the owner name *.X.ZONE and an RDATA of the next name after the wildcard. This \"*\" type owner name is not expanded when the NXT is returned as authority information in connection with a query for a non-existent name.\n\nIf there could be any wildcard RRs in a zone and thus wildcard NXTs, care must be taken in interpreting the results of explicit NXT retrievals as the owner name may be a wildcard expansion.\n\nThe existence of one or more wildcard RRs covering a name interval makes it possible for a malicious server to hide any more specifically named RRs in the internal. The server can just falsely return the wildcard match NXT instead of the more specifically named RRs. If there is a zone wide wildcard, there will be an NXT RR whose owner name is the wild card and whose RDATA is the zone name. In this case a server could conceal the existence of any more specific RRs in the zone. It would be possible to design a more strict NXT feature which would eliminate this possibility. But it would be more complex and might be so constraining as to make any dynamic update feature very difficult.\n\n5.5 Blocking NXT Pseudo-Zone Transfers\n\nIn a secure zone, a resolver can query for the initial NXT associated with the zone name. Using the next domain name RDATA field from that RR, it can query for the next NXT RR. By repeating this, it can walk through all the NXTs in the zone. If there are no wildcards, it can use this technique to find all names in a zone. If it does type ANY queries, it can incrementally get all information in the zone and thus defeat attempts to administratively block zone transfers.\n\nIf there are any wildcards, this NXT walking technique will not find any more specific RR names in the part of the name space the wildcard covers. By doing explicit retrievals for wildcard names, a resolver could determine what intervals are covered by wildcards but still could not, with these techniques, find any names inside such intervals except by trying every name.\n\nIf it is desired to block NXT walking, the recommended method is to add a zone wide wildcard of the KEY type with the no-key type value and with no type (zone, entity, or user) bit on. This will cause there to be one zone covering NXT RR and leak no information about what real names exist in the zone. This protection from pseudo-zone transfers is bought at the expense of eliminating the data origin authentication of the non-existence of names that NXT RRs can provide. If an entire zone is covered by a wildcard, a malicious server can return an RR produced by matching the resulting wildcard NXT and can thus hide all the real data and delegations in the zone that have more specific names.\n\n5.6 Special Considerations at Delegation Points\n\nA name (other than root) which is the head of a zone also appears as the leaf in a superzone. If both are secure, there will always be two different NXT RRs with the same name. They can be distinguished by their signers and next domain name fields. Security aware servers should return the correct NXT automatically when required to authenticate the non-existence of a name and both NXTs, if available, on explicit query for type NXT.\n\nInsecure servers will never automatically return an NXT and some implementations may only return the NXT from the subzone on explicit queries.\n\n6. The AD and CD Bits and How to Resolve Securely\n\nRetrieving or resolving authentic data from the Domain Name System (DNS) involves starting with one or more trusted public keys for one or more zones. With trusted keys, a resolver willing to perform cryptography can progress securely through the secure DNS zone structure to the zone of interest as described in Section 6.3. Such trusted public keys would normally be configured in a manner similar to that described in Section 6.2. However, as a practical matter, a security aware resolver would still gain some confidence in the results it returns even if it was not configured with any keys but trusted what it got from a local well known server as a starting point.\n\nData stored at a security aware server needs to be internally categorized as Authenticated, Pending, or Insecure. There is also a fourth transient state of Bad which indicates that all SIG checks have explicitly failed on the data. Such Bad data is not retained at a security aware server. Authenticated means that the data has a valid SIG under a KEY traceable via a chain of zero or more SIG and KEY RRs to a KEY configured at the resolver via its boot file. Pending data has no authenticated SIGs and at least one additional SIG the resolver is still trying to authenticate. Insecure data is data which it is known can never be either Authenticated or found Bad because it is in or has been reached via a non-secured zone. Behavior in terms of control of and flagging based on such data labels is described in Section 6.1.\n\n\n6.1 The AD and CD Header Bits\n\nTwo previously unused bits are allocated out of the DNS query/response format header. The AD (authentic data) bit indicates in a response that the data included has been verified by the server providing it. The CD (checking disabled) bit indicates in a query that non-verified data is acceptable to the resolver sending the query.\n\nThese bits are allocated from the must-be-zero Z field as follows:\n\n 1 1 1 1 1 1\n | ID |\n | QDCOUNT |\n | ANCOUNT |\n | NSCOUNT |\n | ARCOUNT |\n\nThese bits are zero in old servers and resolvers. Thus the responses of old servers are not flagged as authenticated to security aware resolvers and queries from non-security aware resolvers do not assert the checking disabled bit and thus will be answered by security aware servers only with authenticated data. Aware resolvers MUST not trust the AD bit unless they trust the server they are talking to and either have a secure path to it or use DNS transaction security.\n\nAny security aware resolver willing to do cryptography SHOULD assert the CD bit on all queries to reduce DNS latency time by allowing security aware servers to answer before they have resolved the validity of data.\n\nSecurity aware servers NEVER return Bad data. For non-security aware resolvers or security aware resolvers requesting service by having the CD bit clear, security aware servers MUST return only Authenticated or Insecure data with the AD bit set in the response. Security aware resolvers will know that if data is Insecure versus Authentic by the absence of SIG RRs. Security aware servers MAY return Pending data to security aware resolvers requesting the service by clearing the AD bit in the response. The AD bit MUST NOT be set on a response unless all of the RRs in the response are either Authenticated or Insecure.\n\n6.2 Boot File Format\n\nTwo boot file directives are added as described in this section.\n\nThe format for a boot file directive to configure a starting zone key is as follows:\n\npubkey name flags protocol algorithm key-data\n\nfor a public key. \"name\" is the owner name (if the line is translated into a KEY RR). Flags indicates the type of key and is the same as the flag octet in the KEY RR. Protocol and algorithm also have the same meaning as they do in the KEY RR. The material after the algorithm is algorithm dependent and, for private algorithms (algorithm 254), starts with the algorithm's identifying OID and its length. If the \"no key\" type value is set in flags or the algorithm is specified as 253, then the key-data after algorithm is null. When present the key-data is treated as an octet stream and encoded in base 64 (see Appendix).\n\nA file of keys for cross certification or other purposes can be configured though the keyfile directive as follows:\n\n keyfile filename\n\nThe file looks like a master file except that it can only contain KEY and SIG RRs with the SIGs signed under a key configured with the pubkey directive.\n\nWhile it might seem logical for everyone to start with the key for the root zone, this has problems. The logistics of updating every DNS resolver in the world when the root key changes would be excessive. It may be some time before there even is a root key. Furthermore, many organizations will explicitly wish their \"interior\" DNS implementations to completely trust only their own zone. Such interior resolvers can then go through the organization's zone servers to access data outsize the organization's domain and should only be configured with the key forthe organization's DNS apex.\n\n6.3 Chaining Through Zones\n\nStarting with one or more trusted keys for a zone, it should be possible to retrieve signed keys for its subzones which have a key and, if the zone is not root, for its superzone. Every authoritative secure zone server MUST also include the KEY RR for a super-zone signed by the secure zone via a keyfile directive. This makes it possible to climb the tree of zones if one starts below root. A secure sub-zone is indicated by a KEY RR with non-null key information appearing with the NS RRs for the sub-zone. These make it possible to descend within the tree of zones.\n\nA resolver should keep track of the number of successive secure zones traversed from a starting point to any secure zone it can reach. In general, the lower such a distance number is, the greater the confidence in the data. Data configured via a boot file directive should be given a distance number of zero. If a query encounters different data for the same query with different distance values, that with a larger value should be ignored.\n\nA security conscious resolver should completely refuse to step from a secure zone into a non-secure zone unless the non-secure zone is certified to be non-secure, or only experimentally secure, by the presence of an authenticated KEY RR for the non-secure zone with the no-key type value or the presence of a KEY RR with the experimental bit set. Otherwise the resolver is getting bogus or spoofed data.\n\nIf legitimate non-secure zones are encountered in traversing the DNS tree, then no zone can be trusted as secure that can be reached only via information from such non-secure zones. Since the non-secure zone data could have been spoofed, the \"secure\" zone reach via it could be counterfeit. The \"distance\" to data in such zones or zones reached via such zones could be set to 512 or more as this exceeds the largest possible distance through secure zones in the DNS. Nevertheless, continuing to apply secure checks within \"secure\" zones reached via non-secure zones is a good practice and will, as a practical matter, provide some small increase in security.\n\n6.4 Secure Time\n\n\nA variety of time synchronization protocols exist including the Network Time Protocol (NTP, RFC1305). If such protocols are used, they MUST be used securely so that time can not be spoofed. Otherwise, for example, a host could get its clock turned back and might then believe old SIG and KEY RRs which were valid but no longer are.\n\n7. Operational Considerations\n\nThis section discusses a variety of considerations in secure operation of the Domain Name System (DNS) using these protocol extensions.\n\n7.1 Key Size Considerations\n\nThere are a number of factors that effect public key size choice for use in the DNS security extension. Unfortunately, these factors usually do not all point in the same direction. Choice of zone key size should generally be made by the zone administrator depending on their local conditions.\n\nFor most schemes, larger keys are more secure but slower. Given a small public exponent, verification (the most common operation) for the MD5/RSA algorithm will vary roughly with the square of the modulus length, signing will vary with the cube of the modulus length, and key generation (the least common operation) will vary with the fourth power of the modulus length. The current best algorithms for factoring a modulus and breaking RSA security vary roughly with the 1.6 power of the modulus itself. Thus going from a 640 bit modulus to a 1280 bit modulus only increases the verification time by a factor of 4 but increases the work factor of breaking the key by over 2^900. An upper bound of 2552 bits has been established for the MD5/RSA DNS security algorithm for interoperability purposes.\n\nHowever, larger keys increase the size of the KEY and SIG RRs. This increases the chance of DNS UDP packet overflow and the possible necessity for using higher overhead TCP in responses.\n\nThe recommended minimum RSA algorithm modulus size, 640 bits, is believed by the authors to be secure at this time but high level zones in the DNS tree may wish to set a higher minimum, perhaps 1000 bits, for security reasons. (Since the United States National Security Agency generally permits export of encryption systems using an RSA modulus of up to 512 bits, use of that small a modulus, i.e. n, must be considered weak.)\n\nFor a key used only to secure data and not to secure other keys, 640 bits should be adequate at this time.\n\n7.2 Key Storage\n\nIt is recommended that zone private keys and the zone file master copy be kept and used in off-line non-network connected physically secure machines only. Periodically an application can be run to add authentication to a zone by adding SIG and NXT RRs and adding no-key type KEY RRs for subzones where a real KEY RR is not provided. Then the augmented file can be transferred, perhaps by sneaker-net, to the networked zone primary server machine.\n\nThe idea is to have a one way information flow to the network to avoid the possibility of tampering from the network. Keeping the zone master file on-line on the network and simply cycling it through an off-line signer does not do this. The on-line version could still be tampered with if the host it resides on is compromised. For maximum security, the master copy of the zone file should be off net and should not be updated based on an unsecured network mediated communication.\n\nNote, however, that secure resolvers must be configured with some trusted on-line public key information (or a secure path to such a resolver) or they will be unable to authenticate.\n\nNon-zone private keys, such as host or user keys, generally have to be kept on line to be used for real-time purposes such as DNS transaction security, IPSEC session set-up, or secure mail.\n\n7.3 Key Generation\n\nCareful key generation is a sometimes overlooked but absolutely essential element in any cryptographically secure system. The strongest algorithms used with the longest keys are still of no use if an adversary can guess enough to lower the size of the likely key space so that it can be exhaustively searched. Suggestions will be found in RFC 1750.\n\nIt is strongly recommended that key generation also occur off-line, perhaps on the machine used to sign zones (see Section 7.2).\n\n7.4 Key Lifetimes\n\nNo key should be used forever. The longer a key is in use, the greater the probability that it will have been compromised through carelessness, accident, espionage, or cryptanalysis. Furthermore, if key rollover is a rare event, there is an increased risk that, when the time does come up change the key, no one at the site will remember how to do it or other problems will have developed in the procedures.\n\nWhile key lifetime is a matter of local policy, these considerations suggest that no zone key should have a lifetime significantly over four years. A reasonable maximum lifetime for zone keys that are kept off-line and carefully guarded is 13 months with the intent that they be replaced every year. A reasonable maximum lifetime for end entity and useer keys that are used for IP-security or the like and are kept on line is 36 days with the intent that they be replaced monthly or more often. In some cases, an entity key lifetime of somewhat over a day may be reasonable.\n\n7.5 Signature Lifetime\n\nSignature expiration times must be set far enough in the future that it is quite certain that new signatures can be generated before the old ones expire. However, setting expiration too far into the future could, if bad data or signatures were ever generated, mean a long time to flush such badness.\n\nIt is recommended that signature lifetime be a small multiple of the TTL but not less than a reasonable re-signing interval.\n\n7.6 Root\n\nIt should be noted that in DNS the root is a zone unto itself. Thus the root zone key should only be seen signing itself or signing RRs with names one level below root, such as .aq, .edu, or .arpa. Implementations MAY reject as bogus any purported root signature of records with a name more than one level below root. The root zone contains the root KEY RR signed by a SIG RR under the root key itself.\n\n8. Conformance\n\nLevels of server and resolver conformance are defined.\n\n8.1 Server Conformance\n\nTwo levels of server conformance are defined as follows:\n\nMinimal server compliance is the ability to store and retrieve (including zone transfer) SIG, KEY, and NXT RRs. Any secondary, caching, or other server for a secure zone MUST be at least minimally compliant and even then some things, such as secure CNAMEs, will not work without full compliance.\n\nFull server compliance adds the following to basic compliance:\n\n(1) ability to read SIG, KEY, and NXT RRs in zone files and (2) ability, given a zone file and private key, to add appropriate SIG and NXT RRs, possibly via a separate application, (3) proper automatic inclusion of SIG, KEY, and NXT RRs in responses, (4) suppression of CNAME following on retrieval of the security type RRs, (5) recognize the CD query header bit and set the AD query header bit, as appropriate, and (6) proper handling of the two NXT RRs at delegation points. Primary servers for secure zones MUST be fully compliant and for completely successful secure operation, all secondary, caching, and other servers handling the zone SHOULD be fully compliant as well.\n\n8.2 Resolver Conformance\n\nTwo levels of resolver compliance are defined:\n\n\nA fully compliant resolver (1) understands KEY, SIG, and NXT RRs, (2) maintains appropriate information in its local caches and database to indicate which RRs have been authenticated and to what extent they have been authenticated, (3) performs additional queries as necessary to attempt to obtain KEY, SIG, or NXT RRs from non-security aware servers, (4) normally sets the CD query header bit on its queries.\n\n9. Security Considerations\n\nThis document describes technical details of extensions to the Domain Name System (DNS) protocol to provide data integrity and origin authentication, public key distribution, and optional transaction and request security.\n\n\n\n [NETSEC] - Network Security: PRIVATE Communications in a PUBLIC\n World, Charlie Kaufman, Radia Perlman, & Mike Speciner,\n Prentice Hall Series in Computer Networking and\n Distributed Communications 1995.\n [PKCS1] - PKCS #1: RSA Encryption Standard, RSA Data Security,\n Inc., 3 June 1991, Version 1.4.\n [RFC1032] - Stahl, M., \"Domain Administrators Guide\", RFC 1032,\n November 1987.\n [RFC1033] - Lottor, M., \"Domain Administrators Operations Guide\",\n RRFC 1033, November 1987.\n [RFC1034] - Mockapetris, P., \"Domain Names - Concepts and\n Facilities\", STD 13, RFC 1034, November 1987.\n [RFC1035] - Mockapetris, P., \"Domain Names - Implementation and\n Specifications\", STD 13, RFC 1035, November 1987.\n [RFC1305] - Mills, D., \"Network Time Protocol (v3)\", RFC 1305, March\n [RFC1321] - Rivest, R., \"The MD5 Message-Digest Algorithm\", RFC 1321,\n April 1992.\n [RFC1530] - Malamud, C., and M. Rose, \"Principles of Operation for\n the TPC.INT Subdomain: General Principles and Policy\",\n RFC 1530, October 1993.\n [RFC1750] - Eastlake, D., Crocker, S., and J, Schiller, \"Randomness\n Requirements for Security\", RFC 1750, December 1994.\n [RFC1825] - Atkinson, R., \"Security Architecture for the Internet\n Protocol\", RFC 1825, August 1995.\n\n[RSA FAQ] - RSADSI Frequently Asked Questions periodic posting.\n\nAuthors' Addresses\n\nDonald E. Eastlake 3rd\nCyberCash, Inc.\n318 Acton Street\nCarlisle, MA 01741 USA\n\n Telephone: +1 508-287-4877\n +1 508-371-7148(fax)\n EMail: dee@cybercash.com\n\nCharles W. Kaufman\nIris Associates\n1 Technology Park Drive\nWestford, MA 01886 USA\n\n Telephone: +1 508-392-5276\n EMail: charlie_kaufman@iris.com\n\nAppendix: Base 64 Encoding\n\nThe following encoding technique is taken from RFC 1521 by N. Borenstein and N. Freed. It is reproduced here in an edited form for convenience.\n\n\n\n\nTable 1: The Base 64 Alphabet\n\n Value Encoding Value Encoding Value Encoding Value Encoding\n 0 A 17 R 34 i 51 z\n 1 B 18 S 35 j 52 0\n 2 C 19 T 36 k 53 1\n 3 D 20 U 37 l 54 2\n 4 E 21 V 38 m 55 3\n 5 F 22 W 39 n 56 4\n 6 G 23 X 40 o 57 5\n 7 H 24 Y 41 p 58 6\n 8 I 25 Z 42 q 59 7\n 9 J 26 a 43 r 60 8\n 10 K 27 b 44 s 61 9\n 11 L 28 c 45 t 62 +\n 12 M 29 d 46 u 63 /\n 13 N 30 e 47 v\n 14 O 31 f 48 w (pad) =\n 15 P 32 g 49 x\n 16 Q 33 h 50 y\n", "pred_label": "__label__1", "pred_score_pos": 0.6101981401443481} {"content": "Sunday, October 7, 2012\n\n\nOne of our favorite debuts of the year has come from English band, Tribes. Tribes blend 60's surf-rock and soul, 90's Britpop with modern garage rock hooks, think Dick Dale meets The Strokes with a splash of Blur. The bands debut, Baby, is a slick and catchy record that makes us just want to hit repeat over and over again. As the band drive their success back in the UK, they are already in California recording the follow-up to Baby. We spoke to singer and guitarist Johnny Lloyd about the bands formation, their music and wild nights being a rock star including an allegedly crazy incident with Juliette Lewis. Take a look at our interview with Johnny below.\n\nThe new record is titled, “Baby,” how did the retro / throwback to early rock and roll title come about? \n\nWe couldnt believe it hadn't been used and we wanted something simple and classic.\n\nMuch of the record is about relationships and religion; do you feel that writing about these topics it is easily relatable to anyone listening?\n\nI think relationships and religion are the big issues for people of our generation. The album has been called nostalgic and I would agree with that. It was all about looking back on happier times when I wrote it.\n\nDoes going into the studio to record new material still give you the same aura of wonderment as it did when you first stepped into one?\n\nYes it does. We are very excited about starting work on the second album, recording is a inspiring thing to any musician.\n\nHow did the band come about?\n\nTwo sets of old friends with a love of rock and roll and loose music.\n\nIt has been said that Dan and Miguel met after Dan tried to steal Miguel’s wallet. How did that go from that situation to playing in a band together?\n\nThats how they met. They have been friends ever since.\n\nYou had a packed summer with a slew of festivals you are playing. What do you prefer – playing festivals to a ton of new faces or your own club gigs?\n\nIts two very different things. We have a great time playing festivals but our club shows are pretty sacred to us.\n\n Hailing from Camden Town, does that section of London influence your style and sound?\n\nYes it does. We love The Clash and Blur and we are very proud of being part of the next wave of north London rock and roll.\n\nNME has listed you as the new poster boys for Britpop, do you agree with this? Any pressure applied with a title such as that?\n\nBritpop doesn't exist anymore in the UK it was very much a 90's fad. Poster boys? I'm not sure about that.\n\nYou have taken a big influence from 90’s American bands. What is it about their sound that has influenced you?\n\nI love REM and early Americana . Lyrically this country has more to offer than anywhere elese in the world. We are huge blues fans and so American culture and music has been in our blood from an early age. Its fantastic being here.\n\nBands like Chapel Club, The Vaccines, The Heartbreaks, Sulk, Zulu Winter have been making a big splash and tossing British rock back on the map. How do you set yourself apart from the pact?\n\n- We feel we have more to offer song wise. We touch on subjects other bands don't. We rely on the depth of our music to seperate us from the pack.\n\nBURNING QUESTION – is it true Johnny got drunk with Julliete Lewis and ended up tattooed? \n\nI can't even answer that i was too far gone, but the tattoo is still there.", "pred_label": "__label__1", "pred_score_pos": 0.6361870765686035} {"content": "Teaching students’ dialogical speech through role plays\n\nStatistically, the English language takes the second place after Chinese according to the number of people speaking it. It is a language of international relations, negotiations and business. English is a means for connecting nations and people. Not surprisingly, learning the English language is one of the priorities of the Kazakhstani educational system, as it goes within the President’s trilingual policy. In his speech within Kazakhstan developing Strategy 2050, in regard to English, the President stressed that this language is necessary to represent the country on the world stage. \"Out of 10 million books, which are published in the world, 85% are in English. The latest data in science and information technology is published in English. Today 3,500 foreign companies operate in Kazakhstan. We need a language to communicate and cooperate with them,\"stated the President [1].\n\nThus, we need to know English to provide communications and to be able to converse. That is why, the Foreign Language discipline is peculiar, therefore, learners are aimed at not just acquiring knowledge of the language system, that includes grammar, lexis and phonetics, but also mastering the speech activity in a foreign language as a means of intercultural communication, that results in forming a multilingual and multicultural personality. A student should be able to orient in a lack of language resources and solve communicative problems. Forming communicative competence is one of the aims of the Foreign language discipline.\n\nAccording to the Study program for the major “Foreign Language: 2 foreign languages”, students should master speaking and dialogical skills properly. The students should be able to use a combined dialogue (combination of different types of dialogue) in the process of communication on the basis of new topics and expanded vocabulary in situations of formal and informal communication, using arguments, emotional and evaluation tools. They should easily engage in everyday conversations, exchange information, clarify it, seek briefings, express their attitude towards stated and debated issues. Another ability to acquire is to talk when discussing books, films, television and radio programs and to adapt to the individual and cultural features of a communication partner. Moreover, the students should relate nonverbal means (gestures, facial expressions, posture, etc.) with the communication situation. The volume of their dialogues should be up to 15-20 replicas from each communicant.\n\nIn addition, the students should be able to discuss relevant issues of the conversations, following the rules of speech etiquette. They should be ready to participate in polylogs and discussions in compliance with the speech norms and rules adopted in the countries of the studied language, querying and sharing information, expressing and arguing their point of view, asking an interlocutor and clarifying his or her views and perspectives, taking lead in the conversation, making explanations and supplements, expressing emotional attitude to that being expressed, discussed, read or seen [2].\n\nAll these mean that students should be prepared to face a real life communication situation and be ready to react and communicate adequately in it.\n\nThe main function of a language is to provide communication: to express and receive information. So, language is not as much about rules and grammar it is mostly about interacting, speaking and conversing. A person is meant to know language when he\\she can communicate in this language efficiently. However, there always is a problem for students to communicate fluently because of so called language barrier which is mostly present in speaking. Students can be perfect at reading, listening and grammar but they will fail to speak and improvise in an unprepared situation. Some other problems of meaningful speaking are in asking for information, breaking in, presenting the information in order to define the main problem, expressing negative attitude politely, saying tactfully, changing the subject, guessing, expressing arguments, etc. [3].\n\nThis means that the great importance belongs to developing students’ ability to communicate in a dialogue. Dialogue is a conversation between at least two people who share their views, opinions and replicas answering questions and giving responds. There are several types of dialogues according to the aim of the conversation and message transmitting. They are as follow:\n\n • notification message;\n • question message;\n • motivation message;\n • agreement message;\n • question and answer to the question;\n • question and counter-question;\n • greeting – greeting;\n • goodbye message;\n • thanking – respond message.\n\nIn general, dialogue speech has a number of peculiarities, namely, diversity of types and topics; situational character that means it depends on the situation and has spontaneous nature. Also interlocutors mostly use short statements and often simplified grammar that need to be paid special attention in the English teaching class. Some other features are limited time, use of conversational clichés, anticipation mechanism [4].\n\nActually, the process of conducting a dialogue involves four stages:\n\n 1. Production of utterance;\n 2. Reception of utterance;\n 3. Evaluation of utterance;\n 4. Response to utterance.\n\nReception of utterance and response to it are anticipated by speakers/writers even before they happen, because when one speaks one is already speaking in ways that take into consideration how another one will react or respond. Indeed, at some level, the mere act of speaking presupposes a respondent and therefore it already responds. Dialogue happens, then, not just as a verbal back-and-forth. It also happens as a complex feedback system inherently social in character [5].\n\nAs a matter of fact, the dialogue is a product of at least two persons. Therefore, in this view, dialogic speech, unlike monologic speech, happens impromptu and is not prepared in advance. Often, this becomes the main difficulty for the majority of students, as they fail to improvise and use their knowledge in a practical situation.\n\nAnother difficulty in dialogical speech is that a student should not only react but also give a stimulus in his turn for his companion. Other way it will be only a series of questions and answers, and the dialogue will be far from natural one. Dialogue plays a central role because it is a medium through which participants are able to share their conceptions, verify or test their understanding, and identify areas of common knowledge or difference [3].\n\nTo teach dialogical speech is difficult as a dialogue needs alternate use of students’ abilities to understand the speaker and then to express their own thoughts and ideas. Dialogic speech is mainly of situational character. The linguistic nature of dialogic speech lies in the process of exchanging replications, which are coherent in structural and functional character. The basic goal of dialogic speech teaching is developing the abilities and skills which enable to exchange replications. Other necessary skills are to be good at listening while receiving information and be fluent at speaking to reply. This should be two way communication, not an examination.\n\nThe most common notion in the literature studied is that for mastering any language it is necessary to develop speech skills through different training exercises and speech practice. The foreign authors distinguish two basic stages of dialogic speech teaching. The first is training of abilities to exchange replications during communicative exercises. The second is developing the skills by training the capability to perform exercises of creative nature during a group dialogue, conversation or debate [6].\n\nOral speech in the classroom should be always stimulated and encouraged. Teachers often try to develop students communicative skills through the exercises directed to memorizing and grinding the words, paradigms and grammar rules but the attention also should be paid to training the components of communication, not only to translating some speech patterns from one language to another. There are dialogues offered by the text book which are recommended to be learnt by heart. Students learn them like a poem, however, after they are not able to use the same models in their spontaneous speech. Students have difficulties in using the speech items they have learnt in communicative patterns. Therefore, such types of activities are not efficient in activating speaking skills.\n\nFor developing spontaneous communicative skill students need a series of synthetic exercises which can reproduce communicative model in the required situation or context. In this context, modern interactive techniques become definitely relevant and efficient. One of such techniques is role play games that provide the atmosphere close to real life situation, provoke students’ creative and performing skills and encourage them to speak. Such kind of communication activities gives students practice in using the language under controlled conditions.\n\nRole-playing games is one of the main methods that ensure active participation, involvement, experimentation and discovery in learning. It gives students the opportunity to go through all the stages of the learning cycle, including the learning through training, performing some tasks, the embodiment of theory into practice, repetition (review) and feedback. It is a very flexible method that can be used to put into a lesson something real and practical. Role-playing games are used in many situations, contributing to the development of interpersonal skills. For example, in conversation, conflict resolution, in the work relating to people, and develops students' confidence in them [7].\n\nRole playing is a kind of game methods based on the simulation of social roles in the process of solving educational and professional goals. In the conditions of role-playing game learner faces situations that are not typical for his\\her real activities and roles, and where he\\she is forced to change their communication skills. Effectiveness of the training is provided by the fact that a person is better able to absorb the knowledge, skills and abilities in situations, when he\\she has to accept a social role, previously not known to him / her. Moreover, being in someone else’s role reduces psychological tension and increases creativity [8].\n\nThus, role plays can be successfully implemented in teaching dialogical skills, because in a role play both language and other communication methods are used in the game in a way that learning becomes an integral part of the task. Acting out scenes from everyday life, especially those situations in which a new lexical material is involved, students get the opportunity to use the language in a free and entertaining manner. These activities develop fluency. To help students to speak on different topics, teachers may give them topical patterns, provide special worksheets and essential vocabulary lists, so all the students can be involved into conversation. Later the students will be able to transfer the patterns on their topics.\n\nRole-playing games help to develop communicative skills. In many situations a communicative task is the goal, which is assigned in the specific conditions of communication, from which it is clear who is speaking, to whom, about what, under what circumstances and why. Most of the communicative tasks are based on dramatization. Intensive methods made sketches and role plays pretty common. It is because dramatization is an accurate model of the true communication, which saves its main features. Therefore, role plays provide safe environment, where participants can practice or rehearse new language models, practice their speaking skills, making mistakes without being afraid or embarrassed, without terrible consequences. This is practice without troubles. And any role play is a great possibility to provide experiments and put theory into practice [7].\n\nAs a role playing game can be structured or spontaneous it can help not only to train grammatical or lexical patterns, but also make students give impromptu speeches. The participants should not only speak according to their roles and the goal of their communication, but also react to the partner’s lines, show understanding, empathy, mercy using special vocabulary and change behavior and relationships via discovering other points of view, roles or feelings.\n\nAnother positive aspect of a role play is an opportunity to receive feedback and discuss all the advantages and drawbacks of the conversation and find the ways to avoid disadvantages in future talks. In addition, role play games provide an opportunity to rehearse a real situation from the participants’ life or an event which they can face once. This helps to get students prepared to a communication situation, form their awareness about it and practice to dialogue in it.\n\nUnfortunately, we can point out some impediments of role playing games in teaching. First of all, participants can feel inconvenient because of the necessity to act a role in front of the audience, lack of confidence in their abilities to perform the role, lack of information about the role or situation. Also, passivity may occur if only few people take part in a game, but others only watch. The problem can be solved if observers are given concrete tasks, instructions or question, they have to answer in the end. As we stated that feedback is a good way to work on drawbacks, the quality of feedback can depend on the observing skills of participants and some offences can occur if the feedback was indelicate or, on the contrary, observers can be afraid to insult his \\her feelings and will not give fair respond [9]. That is why, teacher should provide good, friendly atmosphere, in which everyone will be free to act. The participants also should be thought to accept constructive critics and consider it as a motive for further improvement.\n\nIn spite of these negative aspects we can add some more advantages. For example, a role play is an interesting and unusual type of teaching exercises, which is not only useful in training dialogic speech, but also can help developing interpersonal and intrapersonal skills. Thus, it helps to improve the feeling of empa-\n\nthy, initiative and responsibility and develop self-confidence. Due to its game nature a role play disposes indifference and helps to remove barriers in the classroom, consequently, the group becomes united. Also, students get more in-depth understanding of the course material and gain necessary skills for in-and-out-ofclassroom communication. Overall, using role plays in teaching, teachers train students to be able to use their newly learned knowledge for the solution of important problems [9].\n\nIndeed, many of the things we do in our everyday life are related with language. For instance, we talk about our favorite hobbies, we have interviews, we purchase a service, we talk about our feelings, we suffer a disease and complain about it, we give health advice, we recommend a product or buy something, we describe places and so on. While learning a language students should be given an opportunity to try themselves in a communicative situation close to real life without learnt scenarios and written lines. Students should be able to meet a foreigner in their local city and explain him the direction to the hotel; or come to a foreign country and be able to make purchases or book a flight ticket. This can be successfully achieved if the students get the ability to “go through” such situation, which can be provided by a role play game. All the essential vocabulary, small-talk phrases and special lines for responding and emphasizing will be better learnt through practice. In methodological aspect: role plays as a task based focus are a part of a language teaching method centered in actions, because it considers the students learning the language as members of a society that has tasks that need to be done within a series of specific circumstances, in a specific environment and inside a specific field of action. Therefore, language is closely related to tasks, so language teaching should incorporate those tasks and aim to produce the language for those specific tasks [10].\n\nMoreover, in a role playing lesson there is increased involvement on the part of the students, who become not passive recipients of the instructor’s knowledge. Rather, they take an active part. Poorman (2002) observes that “true learning cannot take place when students are passive observers of the teaching process”.\n\nIn addition, the educational advantages from using role-play in teaching include the following ideas. It encourages individuals, while in role, to reflect upon their knowledge of a subject. As such, role-play is an excellent teaching method for reviewing material at the end of a course of study. It gives life and immediacy to academic material that can be largely descriptive and/or theoretical. Also, a role play can encourage students to empathize with the position and feelings of others something that, in the normal process of teaching, is likely to be missed [11].\n\nTo achieve good result at teaching dialogical speech through role plays a teacher should structure the lesson, typically involving the following steps:\n\n 1. Preparing. On this stage students should review the essential vocabulary, and remember the real-life situation related to the content, and discuss the context of the role play.\n 2. Modeling and eliciting. This step allows demonstrating the stages typically involved in the transaction, eliciting suggestions for how each stage can be carried out, and teaching the functional language needed for each stage.\n 3. Practicing and reviewing. On this stage students are assigned their roles and they practice the role play using cue cards or worksheets to provide language and other support.\n\nDuring the lesson the teacher should comply with the following principles:\n\n 1. Organizing spatial environment reasonable and adequate to gaming activity. The playing field must liberate the student, rather than create additional difficulties.\n 2. A player should be given an opportunity to express him/herself in different roles according to individual (intellectual and creative) abilities.\n 3. Teaching interaction should be provided in the conditions of \"normalization\", i.e. in strict compliance with the norms and rules formulated by the teacher.\n 4. Decision-making teaching requires a sufficiently strong compliance of the regulations and the availability of the element of uncertainty in the information, and the development of progressive (based on an objective criteria) approaches to collective decisionmaking.\n 5. Compulsory participation of all students in the whole cycle of gaming sessions.\n\nFollowing these principles will make the lesson, based on role playing game method, effective and productive.\n\nDrawing up a conclusion, it is necessary to emphasize that a role play game is an efficient tool in teaching dialogical skills. Students can better practice their dialogue speeches in a role play due to its numerous advantages, namely, providing favorable atmosphere for creativity and ability to be someone and play a role; enhancing students’ interest and motivation and improving the efficiency of a lesson; providing the situational context with a necessity to solve a task. Thus, a Role playing-based lesson aimed at developing dialogical skills is quite efficient and reflects the general concept and need of modern Kazakhstani teaching. It can become that “qualitative ‘breakthrough’ in the English language studying” which the President spoke about in his speech. “Eventually, it will provide every Kazakhstani citizen with new boundless opportunities in life” and such a modern technique will benefit the whole communication process.\n\n\n 1. www.strategy2050.kz\n 2. Study program for the major “Foreign language: 2 foreign languages”. Almaty, 2011.\n 3. Kuznetsova A.Sozaeva Ye. The Development of Oral Dialogical Speech Skill in the Intermediate Level\n 4. http://www.mindomo.com/\n 5. Scholtz A. Speech-Act Theory, Dialogical Theory, Democracy, for “Persuasion in Ancient Greece”\n 6. Vida Asanavičienė, Nijolė Žegūnienė. Priorities оf Dialogic Speech Teaching Methodology аt Higher Non-Linguistic School, 2010\n 7. Pfeiffer and Jones, “Annual guidebook for teachers”, 1983\n 8. Morry van Ments, “The Effective use of Role-Play”, London, 1999\n 9. ICMA/ USAID, Project \"Development of local self-government in Kazakhstan\", Guidebook “Teacher’s teaching”, 2004\n 10. http://www.hablayapanama.com/ 11. Lori Jarvis, Kathryn Odell, and Mike Troiano. Role-Playing as a Teaching Strategy, 2002.\nYear: 2015\nCity: Almaty\nCategory: Philology", "pred_label": "__label__1", "pred_score_pos": 0.8089993000030518} {"content": "Quick Answer: Is Kanban Pull Or Push?\n\nIs Kanban a pull system?\n\nKanban, based on manufacturing processes adopted in Japan after World War II, employs a pull system using Kanban Cards placed on a Kanban Board to track work through the system.\n\nPull scheduling is monitored using maximum Work in Progress within any category of work..\n\nWhat are two types of kanban cards?\n\nKanban Cards and Kanban SystemsProduction Kanban. This type of Kanban is probably the most basic one. … Withdrawal Kanban. The withdrawal or conveyance Kanban system is concerned with the movement of items and components. … Supplier Kanban. … Emergency Kanban. … Express Kanban. … Through Kanban.\n\nWhat is Kanban with example?\n\nWork-in-process, or WIP, limits are another key Kanban concept that can help all teams, including development teams, actively manage the flow of work through their system. In this Kanban board example, the team is using WIP limits to limit the number of work items that can exist in any given step at any given time.\n\nWhen should Kanban be used?\n\nKanban is great for teams that have lots of incoming requests that vary in priority and size. Whereas scrum processes require high control over what is in scope, kanban let’s you go with the flow. Let’s take a look at the same five considerations to help you decide.\n\nWhat is a kanban card?\n\nA Kanban card is a visual representation of a work item on a Kanban board. Think of a Kanban board as a whiteboard, with vertical lanes representing the steps in a process.\n\nWhich represent pull in kanban?\n\nA Pull System is a lean technique that is used to control the flow of work by only replacing what has been consumed. This means that the trigger for work to be done is when a customer demands for it. To better visualize a Pull System, take for example a vending machine.\n\nWhat is the difference between a push and a pull system?\n\n» Push System: is a system in which we produce goods based on our best projections of what the market wants. Essentially the production of goods is scheduled and based on a plan with deadlines. … » Pull System: is a system in which the production of goods is initiated by the person or organization who consumes that good.\n\nWhat is an example of a push strategy?\n\nA push strategy tries to sell directly to the consumer, bypassing other distribution channels. … For example, offering subsidies on the handsets to encourage retailers to sell higher volumes. Direct selling and trade promotions are often the most effective promotional tools for companies such as Nokia.\n\nWhat is a push and a pull?\n\nA pull is when you use force to move a thing (object) closer to you. Push. A push is when you use force to move a thing (object) away from you. Motion. Motion is when something (an object) is moving.\n\nWhat is kanban process?\n\nKanban is a method for managing the creation of products with an emphasis on continual delivery while not overburdening the development team. Like scrum, kanban is a process designed to help teams work together more effectively.\n\nWhat is the purpose of kanban?\n\nKanban is one of the Lean tools designed to reduce the idle time in a production process. The main idea behind the Kanban system is to deliver what the process needs exactly when it needs it. In Japanese, the word “Kan” means “visual” and “ban” means “card,” so Kanban refers to visual cards.\n\nDoes Walmart use a push or pull strategy?\n\nThe business terms push and pull originated in logistics and supply chain management, but are also widely used in marketing, and is also a term widely used in the hotel distribution business. Walmart is an example of a company that uses the push vs. pull strategy.\n\nWhat should be on a kanban card?\n\nAt its core, the kanban card encourages teamwork by helping team members communicate and share information visually. Kanban cards allow teams to: View important details about work items at a glance. Each kanban card typically features a brief description of a work item, along with its owner, due date, and status.\n\nWhat are the 6 rules of kanban?\n\nThe Six Rules of KanbanNever Pass Defective Products. … Take Only What’s Needed. … Produce the Exact Quantity Required. … Level the Production. … Fine-tune the Production or Process Optimization. … Stabilize and Rationalize the Process.\n\nWhat is Kanban in Six Sigma?\n\nKANBAN is a LEAN and JIT tool to control the flow of raw materials and Work In Progress into and out of the production system. It was developed by Taichi Ohno in Toyota to streamline the operations. It is one of the ways and means to achieve Just in Time Manufacturing.", "pred_label": "__label__1", "pred_score_pos": 0.9191690683364868} {"content": "Ooof, lots going on in the Fediverse lately.\n\nLots of hugs, everyone. I hope you're able to find some time for yourself; do something nice for yourself, and interact with a loved one. Take care. :heart_hands:\n\nSign in to participate in the conversation\n", "pred_label": "__label__1", "pred_score_pos": 0.9239245057106018} {"content": "Quick Answer: Why Did David Write Psalm 37?\n\nHow old was David when he wrote Psalm 37?\n\nWritten around 1000 B.C., Psalm 37 is part of the first collection of Psalms and authorship is normally attributed to none other than King David (Bible Basics).\n\nAccording to the text, Psalm 37 was written when David was an old man (see verse 25)..\n\nWhat does Psalm 27 say?\n\n\nDoes God laugh with joy?\n\nThree times in the Book of Psalms (Psalm 2:4; 37:13; 59:8) we read that God shall laugh. The word “laugh” does not mean what we usually think of today as laughing with “joy” or “making a joke of.” It always means, “to hold in derision — to mock or to scorn.” … Then he places his confidence in His God.\n\nWhat does noisome pestilence mean in the Bible?\n\n1 : noxious, harmful a noisome pestilence. 2a : offensive to the senses and especially to the sense of smell noisome garbage. b : highly obnoxious or objectionable noisome habits.\n\nWho wrote Psalm 91 and why?\n\nThough no author is mentioned in the Hebrew text of this psalm, Jewish tradition ascribes it to Moses, with David compiling it in his Book of Psalms. The Greek Septuagint translation of the Old Testament attributes it to David.\n\nWhat does a contrite heart mean?\n\n\nWhat does God say about laughter?\n\nWhenever “Laugher Sunday” is celebrated, and by whatever name, it is characterized by joking around, singing, dancing, and merry-making. And it reminds participants that God is a God of laughter as well as of sorrow – much as God is Lord of the valleys as well as the mountain tops (Genesis 21:1-6). Read more.\n\nWho is Abimelech in Bible?\n\nAbimelech (/əˈbɪməˌlɛk/; אֲבִימֶלֶךְ ‘Ǎḇîmeleḵ) was the king of Shechem and a son of biblical judge Gideon. His name can best be interpreted as “my father is king”, claiming the inherited right to rule.\n\nWhat is the meaning of Psalm 33?\n\n33 is a song of praise. (1) A call to worship in the temple with song, music, and shouting (v.1-3), because of the righteousness and kindness of Yahweh (v.4-5). … A gloss praises the plans of Yahweh as everlastingly secure, and also the happiness of His people (v.11-12).”\n\nIs Psalm 91 a prayer?\n\n\nWhat does Psalm 37 say?\n\nTrust in the LORD and do good; dwell in the land and enjoy safe pasture. Delight yourself in the LORD and he will give you the desires of your heart. He will make your righteousness shine like the dawn, the justice of your cause like the noonday sun.\n\nWhy did King David write Psalm 34?\n\nPsalm 34 attributes its own authorship to David. The Psalm’s sub-title, A Psalm of David when he pretended madness before Abimelech, who drove him away, and he departed, derives from when David was living with the Philistines, but the account of this event in 1 Samuel 21 refers to the king as Achish, not Abimelech.\n\nWhat does the Bible say about joy?\n\n#5 – Nehemiah 8:10 – The Joy Of The Lord Is My Strength. Nehemiah said, “Go and enjoy choice food and sweet drinks, and send some to those who have nothing prepared. This day is holy to our Lord. Do not grieve, for the joy of the Lord is your strength.”\n\nWhat Bible says about fear and anxiety?\n\n“An anxious heart weighs a man down, but a kind word cheers him up” (Proverbs 12:25, NIV). “I sought the LORD, and he heard me, and delivered me from all my fears” (Psalm 34:4). “Do not be anxious about anything, but in everything, by prayer and petition, with thanksgiving, present your requests to God.\n\nWhat does delight mean in Psalm 37?\n\nTaking delight in the Lord means that our hearts truly find peace and fulfillment in Him. This world can never satisfy our deepest longings, but if we choose to delight in God’s way, He will always provide above and beyond our expectations.\n\nWhat is Holy Ghost laughter?\n\nFrom Wikipedia, the free encyclopedia. Holy laughter is a term used within charismatic Christianity that describes a religious behaviour in which individuals spontaneously laugh during church meetings.\n\nWhat does the Bible say about brokenhearted?\n\nGod was near us brokenhearted ones. … Psalm 147:3 says, “He heals the brokenhearted, and bind up their wounds.” Psalm 51, the most honest confession of personal sin in the Bible, ends with these words to God: “You will not despise this broken and crushed heart.”\n\nWhat is the meaning behind Psalms 38?\n\nThe Psalm’s topic is God’s displeasure at sin. ( 1–11) and the psalmist’s sufferings and prayers. ( 12–22). The Psalm opens with a prayer, David felt as if he had been forgotten of his God. It then passes intermittently between complaint and hope.\n\nWhat is the context of Psalm 37?\n\nPsalm 37 is a response to the problem of evil, which the Old Testament often expresses as a question: why do the wicked prosper and the good suffer? The Psalm answers that the situation is only temporary. Catholicism sees, God will reverse things, rewarding the good and punishing the wicked here on earth.\n\nWhat does the word delight mean in the Bible?\n\n(Entry 1 of 2) 1 : a high degree of gratification or pleasure : joy children squealing in delight also : extreme satisfaction seems to take delight in the misfortunes of others. 2 : something that gives great pleasure her performance was a delight.\n\nWhat does Psalm 13 say?\n", "pred_label": "__label__1", "pred_score_pos": 0.817383348941803} {"content": "Additional language skills: italian (3 ECTS)\n\nA.A. 2020/2021\nCrediti massimi\nObiettivi formativi\nAttaining the A2 level according to the he Common European Framework of Reference for Languages (CEFR).\nRisultati apprendimento attesi\nReading comprehension: reading very short and simple texts and find specific, predictable information in simple everyday material such as advertisements, menus and timetables; understanding short and simple personal letters.\n\nListening comprehension: understanding phrases and the most common words related to family, shopping, local geography; understanding the main elements in short, clear, simple messages and announcements.\nProgramma e organizzazione didattica\n\nEdizione unica\n\n- CFU: 3\nValutazione della lingua: 0 ore", "pred_label": "__label__1", "pred_score_pos": 0.9999361634254456} {"content": "Quick Answer: How Do I Know I’M Hungry?\n\nWhat organ makes you feel hungry?\n\nThe body’s system for regulating food intake is coordinated by the hypothalamus, which is located under the midline of the brain, behind the eyes: Within the hypothalamus are nerve cells that, when activated, produce the sensation of hunger..\n\nWhat causes excessive hunger?\n\n\nHow can I drop 20 pounds in a week?\n\n\nWill I lose weight if I eat once a day?\n\nBottom line. Eating one meal a day may be a popular way to lose weight, but it’s likely not a good idea for overall health. Although fasting in general — including prolonged fasting — may benefit health in a number of ways, people can reach the same health benefits using much more sustainable methods.\n\nIs it healthy to feel hungry?\n\nBeing hungry is good for the gut It varies between people, but between 24 and 48 hours is perfectly normal. If you eat therefore every couple of hours all day long, with the only break being for a few hours overnight, you gut is in a constant state of digestion.\n\nWhere do you feel hunger?\n\nHunger can be felt physically in our stomachs or we may notice other sensations. A good way to start tuning in to your hunger is by using a hunger scale and take notice of where you typically notice hunger and when you actually eat. You may experience light-headed/dizziness/faintness at a hunger level of 1-2.\n\nWhat is your body telling you when you feel hungry?\n\n\nHow can I kill my appetite?\n\nHere is a list of 18 science-based ways to reduce excessive hunger and appetite:Eat Enough Protein. … Opt for Fiber-Rich Foods. … Pick Solids Over Liquids. … Drink Coffee. … Fill Up on Water. … Eat Mindfully. … Indulge in Dark Chocolate. … Eat Some Ginger.More items…•\n\nCan you ignore hunger?\n\nSo yes, it’s OK to ignore beginning signals of hunger such as low energy or a gurgling belly, but you definitely don’t want to get to the point where you’re so starved you’re lightheaded or nauseous, can’t concentrate, have a headache, or get hangry.\n\n\n\nWhat is toxic hunger?\n\nOur contention is that during the catabolic phase of the digestion and refeeding cycle, when digestive activities cease, these withdrawal symptoms, misperceived as “hunger”, develop from a diet that is inadequate or poor in micronutrients. We call these symptoms “toxic hunger”.\n\nWhat does it feel like to be really hungry?\n\nPhysical hunger can be felt as “hunger” pangs in the stomach, but can also be felt as a headache, stomach pain, growling or gurgling, feeling “empty,” feeling dizzy, having trouble concentrating, feeling tired, weak, shaky or nauseous, feeling “hangry;” irritable, angry, cranky, or even thinking about food!\n\nWill I lose weight if I stop eating for 3 days?\n\n\nWhich meal is best to skip?\n\nScientists have proven once-and-for-all it’s easier to lose weight if you eat breakfast and avoid late-night snacks. Subjects in the US study had lunch and dinner at the same times every day – 12:30pm and 5:45pm – but half had their third meal at 10pm, and the others at a more traditional breakfast time – 8am.\n\nCan your stomach shrink from not eating?\n\n\nCan I go 7 days without food?\n\n\nHow many days can you go without food?\n\n\n\n\nWhat happens when you ignore hunger?\n\nIgnoring your hunger sets your body up to physically rebel by making you focus only on eating and food. Your attempts to push down your hunger cause your brain to focus more and more on eating and food. Your body has one driving goal – survival. To survive your body must sleep, eat and drink water.\n\nWhat happens when you’re hungry and don’t eat?\n\nYour body will use stored glucose as energy and continue to function as though you’ll be eating again soon. After eight hours without eating, your body will begin to use stored fats for energy. Your body will continue to use stored fat to create energy throughout the remainder of your 24-hour fast.\n\nIs it OK to go to bed hungry?\n\n\nWhat does a 72 hour fast do to your body?\n\nClearly not eating for this long means your body will be dipping into its fat reserves, resulting in weight loss. But people claim a range of other benefits, including improvements to your immune system, giving your digestive tract a break, better blood-sugar regulation and reduction in inflammation.\n\nHow do I know if I’m hungry or bored?\n\nHow to tell whether you’re truly hungryHunger and thirst cues. The early signs of true hunger may include mild hunger pangs, a feeling of emptiness in your stomach, and stomach rumbling. … Do a mental check-in. Trust yourself to know how your body feels when you’re truly hungry. … Drink a glass of water.", "pred_label": "__label__1", "pred_score_pos": 0.9951817393302917} {"content": "Spread across STFC's Daresbury and Rutherford Laboratory sites, the CSED has a long pedigree of working in high-performance computing (HPC). The heart of our work is the development and application of powerful simulation codes, usually in collaboration with university research groups. Through our involvement in the Collaborative Computational Projects, we bring together leading UK expertise in key fields of computational research to tackle large-scale scientific software development. Our work spans a range of disciplines from quantum chemistry through to biology and engineering, allowing the latest techniques in HPC to be brought to bear in many different areas.\n\nAs well as developing our own codes, we also help others redesign their codes to run on the latest machines or take advantage of newly emerging technology such as FPGAs and co-processors. As supercomputing moves into the era of the petascale (systems running at around 1015 operations per second) we are actively engaged in research to understand the challenges that programming such massive machines will bring.\n\nWe are currently involved in both of the UK's major academic supercomputers, HPCx and HECToR. The 55 teraflop/s (one teraflop/s equals 1012 floating point operations per second) HECTOR machine provides the power to run the largest calculations, and we are looking at innovative ways to use the 12.9 teraflop/s HPCx as a complementary resource to Hector, taking advantage of emerging technology such as Grid computing or using it to drive large-scale visualizations.\n\nTo give a flavour of the kind of research that supercomputers enable, we here highlight two projects in which we are involved: one in climate modelling and the other in the development of quantum computing.\n\nModelling the Oceans\nThe Proudman Oceanographic Laboratory Coastal Ocean Modelling System (POLCOMS) is a simulation code that has been designed to model the global marine environment. At its core, POLCOMS consists of a 3D hydrodynamic model that simulates the effects of pressure, density etc to provide the forces that drive the flow of water. POLCOMS is an interdisciplinary code, so the core can be integrated with other models such as ecosystem (phytoplankton, zooplankton etc) or wave models. Integrating the models or increasing the resolution of any of the components can increase the computational demands by factors of ten to forty, so extensive work has been carried out on the optimization and parallelization of POLCOMS.\n\nFigure 1: Summer mean horizontal circulation around the UK averaged at mid-depth (20-40m) as calculated with POLCOMS.\n\nToday POLCOMS can be run on thousands of processors on machines such as HECToR. Work is currently underway to enable POLCOMS to be run concurrently on multiple supercomputers, fully utilizing the total computing power available across the machines.\n\nRecent studies carried out with POLCOMS have investigated the northwest European shelf seas. The study has been able to separate the model currents into those driven by winds, by changes in density and by the North Atlantic. The study has demonstrated that, contrary to previous thinking, the long-term circulation is actually driven by the smaller but directional density currents and not the stronger, variable winds.\n\nDesigning the Next Generation of Supercomputers\nQuantum computing promises a revolution in the capabilities of computers, harnessing the bizarre properties of matter on a quantum scale to enable calculation rates that are inconceivable with the current computer designs.\n\nThe materials group within CSED has been investigating the spin interactions in carbon peapods, a novel material that holds promise as a component of a quantum computer.\n\nCarbon peapods are carbon nanotubes containing tiny spherical balls of carbon known as fullerenes. Inserting a metal atom such as scandium into each fullerene introduces an unpaired electron that turns each fullerene into a tiny magnet capable of interacting with its neighbour. Each magnet can hold a qubit (the fundamental unit of quantum computing), so a chain of these magnets interacting together is a potential candidate for the core of a quantum computer.\n\nFigure 2: Charge transfer in a Sc@C82@(14,7) peapod as calculated by DFT with CRYSTAL.\n\nThe calculations to model the spin interactions require the use of the computationally demanding density functional theory (DFT). As the carbon peapod system contains more than 600 atoms, this sort of calculation is intractable with standard codes on a conventional system.\n\nThe group has therefore been using the CRYSTAL code developed jointly by CSED and the University of Turin to run the calculations on 512 processors on HPCx. It is only by using the power of such large machines with codes like Crystal that these sorts of calculations become possible.\n\nCSED: http://www.cse.scitech.ac.uk\nHECTOR: http://www.hector.ac.uk\nHPCx: http://www.hpcx.ac.uk\nCRYSTAL: http://www.cse.scitech.ac.uk/cmg/\nCRYSTAL POLCOMS: http://www.pol.ac.uk/home/research/polcoms\n\nPlease contact:\nRichard Blake (Acting Director)\nComputational Science and Engineering Department\nDaresbury Laboratory, UK\nE-mail: r.j.blake@dl.ac.uk\n\nNext issue: April 2021\nSpecial theme:\n\"Brain-Inspired Computing\"\nCall for the next issue\nGet the latest issue to your desktop\nRSS Feed", "pred_label": "__label__1", "pred_score_pos": 0.8770506381988525} {"content": "How Can Anything Be Half-Alive?\n\nBy Doug Marman and Alan Rayner\n\n(This article has also been published on\n\nA new understanding of biology shows that life originates in a community and that individuality evolves when beings work together.\n\nCells that spawned all of life on our planet appear to have lived in hydrothermal vents. Image courtesy of NOAA.\n\n\nRecently, we published a paper showing a new way of looking at the foundation of life: as a relationship between a lifeform and its habitat. If we use this lens, the origin of life suddenly makes a lot more sense.\n\nNow here comes a new study that’s been reported in The NY Times,, The Christian Science Monitor, Independent and others, that identifies the genetic makeup of the cells from which all life on this planet descended. These mother cells are called the “Last Universal Common Ancestor” (LUCA). But the microbiologists who reported this news went on to say that it appears as if LUCA was only “half-alive.” How can anything be half-alive?\n\nThe scientists made this claim for a reason, because they see DNA as a building block of life. You see, a cell’s structure and function is dependent on proteins, and the genes in DNA guide the manufacturing of proteins. This allows a cell to build its own body. But LUCA was missing the genes needed to create crucial proteins. In other words, its genome was incomplete. So it appears that LUCA was dependent on its surroundings to supply the necessary materials.\n\nDoes this mean it was half-alive? No. All living things depend on their neighborhood, as we showed in our previous article. No lifeform is an island because life doesn’t belong to it alone. Living is a relationship—a continual give-and-take—between organisms and other living creatures in the world around them. This is why their bodies are porous and fluid. The expressions of other life forms nourish us, and the wastes and breaths we expel are food for others. Being alive is a shared experience.\n\nThe problem is that we don’t have a scientific explanation for what living is. And since we don’t understand how it works, we revert to old lenses. This is why many who study the origin of life look for cause-and-effect reactions learned from physics and chemistry, even though it’s clear that this approach falls short. Using the wrong lens, unfortunately, can also distort the picture.\n\nSaying that LUCA was half-alive makes no sense. It’s like saying a woman with an unfertilized egg cell is half-pregnant and she becomes fully pregnant only when she gets the necessary ingredients from a sperm cell. That’s ridiculous. There is no such thing as being half-pregnant. There is no such thing as being half-alive. And there is no such thing as independent living because all creatures depend on others to thrive.\n\nComplete independence would only be possible if a creature, by itself, created everything it needed to be alive. That’s impossible. Why? Because living means gathering and using energy, and nothing can create all of the energy it needs, by itself.\n\nWhere does energy come from? For life on Earth, our sun is the main source, but long ago the heat within our planet was also an important element. The molten core created deep sea ‘hydrothermal vents,’ and this is where LUCA appears to have survived.\n\nHowever, this doesn’t tell us fundamentally where energy originates. To understand this, we can’t use the traditional physics that we learned from Isaac Newton, where external forces move lifeless matter. Instead, we must turn to quantum mechanics, which shows us that what physicists call ‘forces’ emerge from invisible, shared exchanges between ‘particles’.\n\nDifferent types of relationships between particles lead to different types of energy.[1] For example, electricity and magnetism are the result of particles forming mutual one-on-one relationships with each other. Organisms display the same trait. Even we, as human beings, feel the power of attraction and repulsion when meeting people. We call it ‘chemistry’.\n\nA second type of relationship leads to an attraction that pulls groups of particles to work together. The bodies of protons and neutrons are formed this way, when three quarks begin spinning as a unified group. And the bodies of atoms are held together by the attraction that emerges from the protons and neutrons that form the nucleus. Physicists call this the strong force. The same unification occurs with living things. We experience the added energy when people work together as a community. And the camaraderie we feel with co-workers is the same feeling of inclusiveness that pulls cells together to work as a body. This is why we see a relationship between living things and their habitats at the heart of every ecosystem.\n\nTherefore, life is expressed through relationships.\n\nAll lifeforms live as members of a community. Painting by Alan Rayner.\n\n\nThis insight paints an inspiring new picture of how the first cells came into existence. There was never a time when ‘lone wolf’ bacteria lived in an empty, inert world because the world we live in is just as much alive with energy as we are. Our desire to live emerges from our relationships with a living environment. This means that the process of evolution is not something that happens to individuals—it is the community and their relationships that evolve.\n\nImagine being the only person in the world. You have no friends, family, or anyone to talk to. Would you ever want to develop a new business? Would you feel the need to learn how to read or write? Does it matter how much money you have?\n\nNow think about what you look forward to when waking up in the morning. Isn’t your involvement with other living beings most important? Relationships are the medium of life.\n\nOnce we see that this is the essence of living, we have a new lens that reveals deeper truths behind the story of life.\n\nFor example, it helps us understand how life developed before genes existed. As we showed in our previous article, if you remove DNA from a cell, the cell will continue living for a while. It can’t reproduce, and it can’t replace or repair proteins, but it’s still alive. This proves that genes aren’t necessary for life to exist.\n\nOn the other hand, if you take DNA out of a cell—its habitat and home—it becomes a mere chemical compound. It doesn’t do anything special. In other words, DNA comes into life when it’s in the right ecosystem. If this is true, then this applies to all of the enzymes and proteins in a cell. That is why they respond to each other and the cell itself. They’re dynamic inhabitants of each other’s neighborhood and the shared space of the cell.\n\nWhere does the magic come from that pulls these molecules and atoms together to form a living organism? More than chemical actions and reactions are needed. A mutually inclusive relationship is required. This ‘quantum state’ is why cells work so closely together that they form our human bodies. It’s a natural phenomenon that emerges from group relationships when beings work for a common good.\n\nAccording to quantum theory, these relationships can’t be explained by their individual components because they’re shared. When quantum particles become ‘entangled,’ an added dynamic exists between them that keeps them allied. This is why dissecting organisms will never show us how life works, because the shared exchanges in relationships are hidden from outsider eyes. Only those involved can feel the fluid cohesion aligning them.\n\nWe aren’t the source of our own life. We need oxygen, carbohydrates, fats, and proteins, all supplied primarily by photosynthetic bacteria and plants, in meat, fruit, and vegetables. Other life forms die for us to live, just as the death of our bodies is food for other organisms. How could human beings ever evolve if these other life forms didn’t evolve first?\n\nEven today, life thrives near hydrothermal vents. Image courtesy of NOAA Okeanos Explorer Program.\n\n\nBiologists are right to say that the first proto-cells—the cells that were not yet able to fashion all the proteins they needed to make their bodies—were dependent on the world around them. If a hydrothermal vent was the source, they were tethered to that vent. They weren’t free to roam elsewhere. Therefore, life was restricted before the necessary genes developed. But this doesn’t mean these proto-cells were half-alive. We have more mobility as human beings today, but we’re just as reliant on our ecosystem. We’ve simply replaced our dependence on a static source of power and materials for dependence on a dynamic neighborhood of cellular life.\n\nThis leads us to a question that has stumped biologists: What gave rise to life before cells began to reproduce? In other words, why did living things start creating progeny in the first place? If being alive is the only objective, then why would proto-cells give birth to children? It didn’t help them persist as individuals. In fact, reproduction is an energy-demanding process that requires life forms to expose themselves to risk rather than seal themselves off from the outside world.\n\nBiologists often turn to Darwinism to explain the mysteries of biological life, but this can’t explain what happened before reproduction began and genes existed. Darwin’s theories offer no help in understanding the meaning of life.\n\nBut if we accept that life is a relationship between living things and their habitat, then we can see what’s missing from the puzzle: Reproduction develops stronger communities. Remember, proto-cells couldn’t survive on their own. They weren’t foolish enough to believe that they lived independently. They belonged within their neighborhood, like a tree is rooted within the earth.\n\nIn other words, they didn’t struggle to preserve their individual lives. They were participating in a shared adventure with others. That is the story of the origin of biological life on Earth.\n\nNo wonder they risked their lives and spent their hard-won energy and resources to produce offspring, because this was the only way they could sustain and build the community they were living in. Helping their community helped them blossom as well, strengthening the mutual relationship\n\nThink of human experiences. Do you feel better when you lie, steal, and think only of your own desires? Or do you feel more empowered and healthier when contributing to a purpose larger than yourself? Psychologists have shown that working for families, friends, communities, and companies leads to psychological growth and maturity. Selfish individuals actually de-evolve. They regress psychologically.[2]\n\nBiologists see the same thing. Parasites devolve. They lose genes over time, making them more and more dependent on their hosts.[3] Their lives get smaller. That’s the outcome of selfish living.\n\nThis all makes sense if living is a relationship between an organism and its habitat. The source of a creature’s life is the community it lives in, even for humans that are free to move around the planet. The more we work to make a healthier ecosystem—to enrich the world—the more we feel life-energy flowing through us. The reason is because energy flows through mutually inclusive relationships.\n\nTherefore, the origin of cellular life needed more than a source of energy. It also required a place where communities of mutually dependent proto-cells could survive for long periods of time. Yes, they needed the right chemical elements, but they also needed other partial life forms, and they needed millions of years. Only then, as they co-evolved their community, could they start making the genes that would one day allow them to roam freely and spread across the globe. Stronger communities, working together, produced genes that would eventually give cells the freedom and ability to roam.\n\nThis reveals a fascinating insight: Individuality evolves when beings work together.\n\nHydrothermal vents create millions of tiny spaces just right for proto-cells. Reproduced with permission from Deborah S. Kelley and the Oceanography Society (Oceanography, Dec. 2007).\n\n\nIt turns out that deep sea hydrothermal vents were perfect environments for the origin of biological life, because they create millions of small cavities, just right for proto-cells to inhabit. Each cavity was a room with a built-in energy supply, as the warm chemistry flowed through it from the molten core. More importantly, the environment could protect a growing community of genetically incomplete cells. And these vents existed for millions of years.\n\nSo the process of life began long before LUCA. Communities grew and evolved gradually over millions of years before giving birth to organisms with mobility. Cellular life then eventually found a way of making their homes in virtually every nook and cranny, from the driest to wettest and coldest to hottest places on the planet.\n\nThe simplest expressions of living are in communities. This is and always has been the heart of life. This is why we grow as individuals when we work for the world we live in. We need our habitat and our habitat needs us. It’s a shared relationship—a quantum condition that is invisible to outside observers. We must be involved in this mutual exchange of life or we can’t live in this world. That’s why there is no such thing as being half-alive.\n\n\n\n[3] Marman, Lenses of Perception, p. 376-378.\n\nFrom Yahoo Finance News\n\nThe Fundamental Building Block of Life Is Not DNA, It’s a Relationship, According to a New Scientific Study\n\nRIDGEFIELD, Wash., July 26, 2016 /PRNewswire/ — All origin-of-life theories have a problem: explaining the gap between chemistry and living cells. A new paper by Doug Marman and Alan Rayner offers a solution by posing that the source of life isn’t DNA, proteins, or any other kind of substance, but the relationship between a life form and its environment. This is consistent with quantum physics, where entangled relationships between particles produce states that can’t be reduced. This creates a bridge between particles and organisms.\n\n“It sounds strange that a relationship would be fundamental,” said Marman. “But quantum theory shows that fundamental particles need relationships to exist in this world. No particle is an island; they are also wave-like. Every biologist knows that the same thing is true for living things: they need their habitat to survive. If we accept this relationship as fundamental, it changes the story of the origin of life and what it means to be alive.”\n\nFor example, a cell can survive for a while if its DNA is removed. But DNA is inert, a mere chemical compound, on its own. Therefore, DNA is involved in the process of life only when it’s in the right environment, a living cell. The same thing is true for the proteins and enzymes in a cell.\n\n“It’s a theory that challenges some fundamental assumptions most scientists have been holding,” says Jonathan Reams, associate professor at the Norwegian University of Science and Technology, who has been following the discussion between Marman and Rayner that led to their study. “They are at the early stages of exploring the implications of the theory, but what I think many will find interesting is that their insights offer new possibilities for how to address many challenges in society today. I would encourage readers to imagine how they could use this theory in their own work and life.”\n\nAbout the Authors:\n\nDoug Marman is author of the recently published book: Lenses of Perception: A Surprising New Look at the Origin of Life, the Laws of Nature, and Our Universe. He was Chief Technology Officer of a $1.7B division of General Electric, co-founder of an artificial intelligence business, and inventor with over 30 patents.\n\nAlan Rayner is a biological scientist, a former Reader in Biology at the University of Bath, and the author of seven academic books. Since spring 2000, he has been pioneering ‘natural inclusionality,’ a new philosophy of ecological and evolutionary diversity and sustainability, based on how we naturally live in the world.\n\nThe Littlest Genome and the Question of Life\n\nBy Doug Marman and Alan Rayner\n\n(This article has also been published on\n\nIn March 2016, a group of biologists led by Craig Venter announced the creation of ‘independently’ living cells with the smallest genome. Their announcement was hailed as a milestone. The big lesson learned by the biologists is that no one can explain why almost one-third of the genes are needed for survival. However, hidden in the subtext of this study, we believe, is an even more important lesson: The most essential ingredient of life may not actually be genes or a substance of any kind, but rather a relationship.\n\nImage of the new freely-living cells with the smallest genome. Image by: Tom Deerinck and Mark Ellisman of the National Center for Imaging and Microscopy Research at the University of California at San Diego.\n\n\nLet’s take a look at the experiment. The first thing you should know is that the new cells created by these biologists were NOT made from scratch. No one knows how to do that. Here’s what happened:\n\nThey started with bacteria that had the smallest genomes they could find. They began deactivating genes, one at a time, to see which ones were needed for survival. If the bacteria lived and kept reproducing, those genes weren’t necessary and were removed.\n\nProgress was slow, but after many years the genome was reduced to half its original size. Every remaining gene has been tested. None can be eliminated. The biologists can explain what two-thirds of these genes do, but the other third remains a mystery. Their goal is now to identify the role of these mystery genes. They hope this will give them a blueprint of what is needed for living cells to survive as independent entities.\n\n31% of the genes have an unknown function. Illustration by Thomas Shafee via Wikipedia.\n\n\nBut there’s more to the story. It turns out that many of the ‘unnecessary’ genes could only be deleted after supplying the petri dish with key nutrients and eliminating potential dangers. As a result, the new cells can no longer survive in the wild because they’ve lost the ability to hunt for food and avoid threats.\n\nIs it fair to say that these are independently living cells? Don’t they need the biologists to feed them and remove their wastes? This is where the story gets interesting.\n\nYou see, the genomes of these cells may be tiny compared to other single-celled organisms, but they are still 200 times larger than the genomes of simple viruses. So they aren’t even close to the littlest genomes.\n\nOutside of a cell, a virus shows no signs of life. Photo by Andrzej Pobiedzinski.\n\n\nViruses, however, are not considered independent life forms because they can’t survive outside a host cell. They need a host in which to live, and they need the genome of the host to reproduce. Viruses are nothing like the life forms that live outside of host organisms. That’s why the biologists wanted to study creatures that live on their own. But do they? Is true independent living even possible?\n\nAll organisms depend on their environment for energy, carbon, and mineral nutrients to grow and reproduce. No plant, animal, or microbe can survive without this supply. Cutting them off leaves them as inactive as a car without fuel. All biologists know this. But if we consider the implications of this deeply, it frames the question of life in a new way and it opens the door to a new explanation for how biological life may have emerged.\n\nTrees create habitats that team with life. Painting by Alan Rayner, from Mycological Research, 102, 1441-1449.\n\n\nFor example, it shows that treating organisms as if they are self-contained entities, isolated from their neighborhood, is a profound mistake because life doesn’t belong to individuals alone. Life is a relationship between creatures and their environment.\n\nWe can’t separate life forms from the habitat they live in any more than we can remove our hearts from our bodies and expect them to keep beating without some external source of support. Organs stop functioning when they’re removed, just as we stop breathing if we’re taken out of the atmosphere created by other living organisms.\n\nIf this is right, then finding which genes are necessary for survival will not in itself explain how life works, because genes aren’t the cause.\n\nLook at what happens when DNA or RNA are removed from cells. The cells can live on for a while, but DNA and RNA stop participating in life. They become inactive chemical compounds.\n\n“Removed from the context of the cell, RNA does nothing functional in a biological sense.”[1]\n\nBut inside cells, DNA and RNA spring into life. Does this mean they are alive?\n\nThis doesn’t sound right if we think of life as something that belongs to individuals. Clearly DNA and RNA don’t possess life by themselves. But if life is a relationship between a life form and the world it is nourished by, then yes, DNA and RNA are involved in life when inside a cell.\n\nThis offers a new solution to the debate over viruses: Are they living organisms or just bits of inactive genetic material that activate when they’re in the right cells? Viruses show no signs of life outside of a host cell. But they truly do spring into life-as-a-relationship inside cells.\n\nSeeds remain dormant until they are in the right habitat. Photo by Adyna\n\n\nSeeds act the same way. If they land on fallow ground with no water, they remain dormant. They need a habitat that welcomes them, to develop.\n\nAre seeds alive before the rain comes? If life is a dynamic, shared relationship between individuals and the world they live in, then we have good reason to say that while seeds are viable, as capsules of living potential, they do not truly come into life until they germinate.\n\nInactive existence, biologically, is completely different from thriving. The distinction between inert material and active living is the crucial mystery of life we are trying to understand. Seeing it as a relationship completes the picture.\n\nFor example, if genes become alive when they’re involved in the life of a living cell, the same can be said for all the other constituents of cellular life, not least the proteins whose two-way relationship with DNA is so central.\n\nThis opens a new door on the origin of life. Every day, biologists see the liveliness of enzymes, as they work for the benefit of the cells they belong to. Even atoms are involved, as seen by the way hydrogen moves through ‘proton pumps,’ guided by electrical charges, in a process that is necessary for the respiration of all organic life on planet Earth. In other words, life reaches all the way down, even to molecules and atoms, as long as they are in the right environment.\n\nThis shifts the puzzle of life to a new question: How do molecules act in such a directed way, as if they are following a plan? Physics and chemistry alone can’t explain it.\n\nSome scientists propose that self-organizing, self-catalytic chemistry may be the key to explaining the origin of life, but this doesn’t get at the real problem. It doesn’t tell us how molecular reactions alone could ever create something with the ability to preserve life, find food, and avoid threats.\n\n“Scientists don’t have any idea how chemical chain reactions could learn to change themselves or the world around them in order to survive… Why would a mixture of chemicals suddenly produce this behavior?”[2]\n\nBut what if cells move our muscles and keep our hearts pumping because they are devoted to us? We would then be the source of the plan they are following. The reason they dedicate themselves to us is because they depend on us. If we die, they die. Our survival is needed for their survival. And we are just as much in need of our cells and neurons to live. This is the relationship we are in. Living is a shared experience.\n\nWhich comes first? Photo by Subhadip Mukherjee.\n\nWhich comes first? Photo by Subhadip Mukherjee.\n\nLooking at life this way seems enigmatic. It brings to mind the paradox of the chicken and the egg. In this case we have to ask: Which comes first, a nourishing environment or the forms that spring into life and embody it? But this isn’t a paradox, because relationships don’t need cause-and-effect. They are mutual. They don’t belong to one person or the other, but both together. Once we see life as a relationship, the puzzle is solved. Eggs and chicken need each other. They can’t live independently.\n\nThis also resolves the mind-body question that has been hounding philosophers for centuries: How do we control our bodies? We just answered that. Our cells do all the work. No life force needed. They move our bodies toward food, away from threats, and into the adventure of life around us, because our life is their world. We depend on each other. Life is only possible when mind and body work together.\n\nCan we explain how this works scientifically? Yes, we only need to turn to quantum mechanics. We find the same principles at work in the subatomic world. There we see that the force of attraction that holds quarks together and forms the bodies of protons emerges from relationships between quarks. Invisible exchanges between quarks create a shared attraction, a bond. The quarks then stop moving as independent particles. They start spinning as one.[3]\n\nCross section of a Jasmine leaf clearly shows the cells working together as one organism. Photo by Krzysztof Szkurlatowski.\n\n\nDoesn’t this sound like cells acting together as one body? And doesn’t the force of attraction between quarks remind us of the attraction we feel in relationships? Something invisible passes between us and others, pulling us together. Our lives then move in synchrony with each other.\n\nThis is the nature of relationships. They’re delicate, like the meaning of a poem hidden between its lines. You can’t pull them apart to see what makes them tick. Dissecting organisms will never explain this mystery. It will never reveal the secret because the relationship is essential.\n\nAll of this leads us to a strange conclusion: The relationship of life reaches all the way down to fundamental particles, as long as they are involved in the right environment. Does this mean that quarks are also dedicated to us because their lives depend on us? That makes no sense. Quarks may form the bodies of protons, but those protons will continue to survive after we die. Is it only our cells that are bound to us in this way?\n\nNo. The key to understanding this is that we are not talking about inert existence, we are talking about participating in the experience of life. This is the only reason that cells are involved in a relationship with us. They don’t just need to exist; they need to live. This is what reaches all the way down.\n\nLooking at life this way seems to be circular, as if it can’t be the full story, until we find the right lens to see it clearly. The authors can attest to this. Both of us took different paths to arrive at this same understanding, but now that we see that relationships are fundamental and can’t be broken down, we see the validity of it everywhere.\n\nWe need to stop treating organisms and cells as if they’re machines made up of components driven by external forces. If that is the lens we use, we will never see life as it is or experience what it means to belong to a living world. We will see only the inertness of things. Molecules then become mere objects moved around by chemistry.\n\nMechanisms can’t help us understand the vitality of life. Quantum mechanics has come to a similar conclusion: Cause-and-effect can’t explain the behavior of subatomic particles. We believe this is the issue that has been clouding our understanding of life.\n\nIn fact, the parallels between quantum behavior and biological life seem too strong to be coincidental.\n\nBee and flowers. Photo by Bruno Schievano.\n\nBee and flowers. Photo by Bruno Schievano.\n\nFor example, one of the most fundamental principles of quantum mechanics is that it is impossible to calculate what an individual particle will do next. We can make good statistical guesses, but there is no way to know the actual outcome because it isn’t determined by external influences alone. Mechanical reactions are not the cause.\n\nDon’t we see this same amazing behavior with organisms? Bees and flowers may lead symbiotic lives, but which flower will the bee choose next? No equation can tell us.\n\nThe quantum world is stranger than fiction. You might think that every electron is attracted to every proton because they have opposite charges, but this isn’t true. The attraction is completely unpredictable when you look at individual particles. This proves that attraction and repulsion between charged particles are not caused by the electromagnetic force. In fact, the exact opposite is true. Relationships are the true source of all electrical and magnetic phenomena.[4]\n\nDoesn’t this have a striking resemblance to the attraction and repulsion that creatures experience with each other when they bond? We call it ‘chemistry,’ but we aren’t drawn to others because of an external force. It isn’t a mechanical reaction. Attraction emerges. When it’s a shared experience, we accept it as real. This is the nature of relationships.\n\n‘Entanglement’ is another mystery of the quantum world. This is the term used to describe the strange alignment that can form between particles without any physical connection. For example, two entangled electrons will spin in opposite directions, no matter how far apart they might be. How do they know which way the other is spinning? How do they stay aligned? Physicists have no answer. They only know that this is a relationship that reaches across space, as if the electrons share one combined state—a state that is more than the sum of its parts.\n\nThis also happens to be one of the most startling qualities of living things: They are more than the sum of their cells and DNA. Organs work together as a single body, as a shared state. In other words, our cells stay aligned because they’re entangled with each other and with us.\n\nSwallowtail butterfly in its natural habitat. Photo by Dale Eurenius.\n\nSwallowtail butterfly in its natural habitat. Photo by Dale Eurenius.\n\nThis brings us to one of the characteristic marks of life: its nested relationships. Genes inhabit cells; cells participate in the life of multicellular organisms; organisms live in communities; communities thrive in ecosystems; and ecosystems work together like organs in the biosphere. At the quantum level, we find quarks combining to form the bodies of protons and neutrons, and those protons and neutrons bond to make atoms.\n\nIn fact, one of the oddest anomalies in physics takes this to the lowest level. According to quantum theory, fundamental particles such as quarks and electrons should be dimensionless points. But every test shows that they inhabit a volume in space. The only way to get their equations to give the right answers is to treat the bodies of quarks and electrons as if they are formed by a ‘cloud’ of invisible ‘virtual’ particles.[5]\n\nThus, in each sphere of life we find individuals ‘entangled’ with a world larger than themselves. And each individual is composed of smaller forms that make up their bodies. This is why we see the nesting of forms all the way down to the level of particles. It comes from the relationship we’ve been talking about, between living things and their environment.\n\nThe closer you study these forms, the more permeable their boundaries look, because they’re never isolated from each other or their surroundings. They are inescapably living within the influence of each other.\n\nThis is the companionship that we see and experience when we open up to nature. Once this relationship sinks in, it transforms the way we think about the evolution of natural diversity and the place of human beings in this story. It reveals the importance of living co-creatively, sustainably, and compassionately, because we are involved in life together.\n\n“Essentially I think this understanding becomes possible as soon as we STOP thinking of ourselves and others as autonomous, free-willed objects subjected to external administration and judgement, and START thinking of ourselves and others as dynamic inhabitants and expressions of our natural neighbourhood, living within each other’s mutual influence…\n\n“Underlying this move is a simple but fundamental shift in the way we perceive all natural, tangible phenomena, including ourselves…”[6]\n\nLiving things all have bodies that are dynamic and permeable for a reason: They’re continually sharing and exchanging with the environment. It’s an amazing relationship, a wonderful dance of give and take that shapes organisms and the world around them. This is what makes life so remarkable.\n\nLooking at it this way, the question—what is life—suddenly takes on a radical new meaning.\n\n[1] Pamela Lyon, “To Be or Not To Be: Where Is Self-Preservation in Evolutionary Theory?” in The Major Transitions in Evolution Revisited, p. 112.\n\n\n\n[4] Ibid, p. 239-247.\n\n[5] Ibid, p. 462-465.", "pred_label": "__label__1", "pred_score_pos": 0.6753453016281128} {"content": "Litigation Lawyers in Morgan City\n\n\nIt's essential to remember what purpose civil litigation in Morgan City, Louisiana is meant to serve. The purpose of civil litigation is not to punish people who have done wrong, or provide victims with some sort of moral vindication.\n\n\nCommon subjects of civil litigation in Morgan City, Louisiana\n\nVirtually anything can be the subject of civil litigation in Morgan City, Louisiana. After all, a legal wrong can be committed in just about any situation imaginable. But, relatively few areas give rise to civil litigation most often in Morgan City, Louisiana.\n\nEmployment: The relationship between employers and employees leads to civil litigation in Morgan City, Louisiana with a good deal of frequency. For example, allegations of gender discrimination, failing to pay at least the minimum wage, and injuries suffered on the job can all lead to civil litigation.\n\nPersonal Injury: When someone is hurt due to the negligence (carelessness) of another, they typically have a legal right to seek compensation for their injuries. Civil litigation in Morgan City, Louisiana is the typically how people seek compensation for physical injuries, including compensation for medical bills, lost wages, and similar losses.\n\nFamily: Most of us know that families in Morgan City, Louisiana don't always get along perfectly. This potential for discord, typically involving disputes over child custody, distribution of property after divorce, or child support, can sometimes lead to civil litigation.\n\nHow Can a Morgan City, Louisiana Lawyer Help?\n\nCivil litigation in Morgan City, Louisiana can get very difficult, and emotions can run high throughout the process. Furthermore, individuals are often faced with civil litigation when they least expect it.\n\nSo, it's always prudent to seek the counsel of a Morgan City, Louisiana lawyer who specialized in civil litigation, if it looks like you're going to be involved in civil litigation any time soon.", "pred_label": "__label__1", "pred_score_pos": 0.963792622089386} {"content": "Litigation Lawyers in Sturgis\n\n\nIn Sturgis, Michigan, you should expect any form of commercial litigation to be expensive and perplexing. While large and sophisticated companies are well-equipped to deal with civil litigation, and are usually the ones facing it, civil litigation in Sturgis, Michigan can also arise between those who are not nearly as accustomed to handling it, such as individuals and small businesses.\n\nCommon Sources of Commercial Litigation in Sturgis, Michigan\n\nCommercial Leases: Despite the rise of the Internet, and e-commerce, most businesses in Sturgis, Michigan still need a physical location to operate. This space is usually rented from another party, under terms laid out in a commercial lease. These leases can lead to disagreements, if one party breaks them, such as by failing to pay rent on time, failure to provide access to the property under the agreed-upon terms, etc.\n\n\n\nBusiness Loans: Usually, when a business gets started in Sturgis, Michigan, it has to take out a loan from a financial institution. If the business fails to make timely payments on the loan, it's possible that litigation will result.\n\nBreach of Contract: When a business or individual in Sturgis, Michigan promises another entity to provide a product or service in exchange for something of value (almost always, but not necessarily, money), they have entered a legally-binding agreement called a \"contract.\" Both parties are now obligated to perform their commitments, as laid out in the agreement, and if one party fails to do so, the other can use commercial litigation to seek redress for any losses suffered as a result of this breach.\n\nHow Can a Sturgis, Michigan Commercial Litigation Lawyer Help?\n\n\nA Sturgis, Michigan commercial litigation attorney can help you on that front. A reputable attorney can advise you of your legal options and commitments, to avoid litigation in the first place, and can provide you with the best possible chance of prevailing if commercial litigation does arise.", "pred_label": "__label__1", "pred_score_pos": 0.6699198484420776} {"content": "For thousands of years, the people who settled these islands lived in harmony with the world around them. \n\nThey studied stars and swells to find their way across oceans. The moon told them when to plant and when to give the land a rest. They knew when and where to rā‘ui the lagoon so fish could breed.\n\nTotal dependence on the environment meant listening to what the environment communicated. It meant always thinking about the future and having enough for days to come. It meant feeling gratitude for the land and sea that give life. There are people in the Cook Islands, and especially in the outer islands, who still pay attention. Others among us have become so disconnected that we don’t understand how much our impact matters.\n\nWe know that the pace of so-called progress is destroying the planet. According to a report backed by 1360 scientists from 95 countries, humans have put too much pressure on two-thirds of the world’s resources. Ninety per cent of fish stocks have been exploited beyond sustainable limits. The seas are warming up and fuelling bigger storms. Scientists expect all corals to be dead by 2050. Modern society is not treating its resources the way the people of these islands once did.\n\nNature is balanced and is always trying to be balanced. In nature, systems are circular. Plant and animal waste can break down into useful nutrients for other living things. Water from the oceans becomes vapour, then clouds, then rain, and then it returns to the oceans. Chemicals essential for life such as oxygen, carbon, and nitrogen are circulated through natural systems. Our modern system is not a circle but a line, and it ends when we run out of resources. \n\nToday the scientists are telling us what the people of this place have always known: If we don’t look after our environment, it won’t look after us. In this section we’ve combined the wisdom of the past and the technologies of today to show you how you can live in harmony with the world around you.\n\n\n\nAkama’ara ‘ia ‘āpopo.\n\n\n\n\n\nThe climate is changing and it’s humanity’s fault. Most scientists agree that the world is getting warmer (and drier, and wetter, and colder, and stormier). Most also agree that modern society created, and continues to create, the problem.\n\nWhen we travel, build cities, cut down trees, and produce food, we use energy. For most of modern history the energy has come from burning fossil fuels like coal, oil, gas, and diesel, a process which releases greenhouse gases into the air. They’re called greenhouse gases because they behave like a huge greenhouse, trapping heat. In the simplest terms, we now have too much trapped heat.\n\nLast year was the hottest year on record. Ice caps are melting. Seas are getting warmer and cyclones are getting more intense. Droughts are getting longer. Global warming isn’t just about warming; it’s about the climate becoming less predictable and extreme weather events becoming more extreme. \n\n\nHow does climate change impact the Cook Islands?\n\nWith funding provided through Climate Change Cook Islands, Dr. Teina Rongo and Celine Dyer were able to conduct surveys in the pa enua to better understand changes in weather patterns. People they interviewed reported:\n\n    Shorter low tides (which means less time for fishing);\n\n    Rougher seas and stronger currents (which means less new recruits of fish, and fishing is more expensive because         you need a powered boat);\n\n   Buildup of sediment/sand in lagoons (and shallower lagoons warm up faster);\n\n    Death of corals (even off Manuae, where no humans live!);\n\n   New problems with pearl oysters;\n\n    Saltwater creeping into taro patches;\n\n    Trees fruiting in the off-season;\n\n   Shifts in rainfall patterns (some islands experiencing more drought, others more rain); and\n\n   Increasingly intense cyclones. \n\n\nWhat’s Climate Change Cook Islands doing about it?\n\nDr. Rongo says that in order to know how to deal with changing weather, we need to pay attention. We need to understand natural rhythms so we can adapt to them.\n\n“Our biggest focus is to reconnect our people back to the land because we’ve lost that connection,” he says. “The new generation has lost the connection to the environment and so it’s hard for them to understand some of these issues. Our children today, they’re not as connected to agriculture. We’ve been talking about reintroducing these activities into the schools. We used to do that, we used to have our own gardens so we started to appreciate the environment. Now our kids are less connected and you can imagine what’s going to happen in the future, when they become leaders, in terms of their decisions. They won’t be environmentally friendly because they don’t have that same appreciation.”\n\nWith the goal of reconnecting younger generations to the land, the team at Climate Change Cook Islands has, among other initiatives:\n\n   Reintroduced traditional fishing practices in the pa enua;\n\n    Encouraged fish feeding (using coconut to feed koperu and ature) on Mangaia;\n\n   Provided fencing for vegetable gardens and training on Nassau;\n\n    Encouraged piere production on Mitiaro (the dried banana lasts up to 30 years!);\n\n   Encouraged planting and worm farming on Palmerston;\n\n    Provided Manihiki and Pukapuka with hydroponics equipment to grow tomatoes and lettuce;\n\n   Built a nursery on Tongareva;\n\n    Taught pa enua communities how to bottle fish;\n\n    Supported Rangi Mitaera-Johnson in her effort to teach every island community in the Cooks about eating local. (For more, see page 25).\n\nWhat can you do?\n\n    If you’re disconnected from the land, reconnect.\n\n   Pay attention to cyclone warnings. Make sure you’re prepared.\n\n    Tap into sources of energy you don’t have to burn, like energy created by the sun, wind, or waves. \n\n   Eat less meat and dairy. The cattle industry produces enormous amounts of greenhouse gases and uses more water than any other industry. (For more about the connection between consuming factory-farmed animal products and climate change, see page 17).\n\n   Buy local. Most industrial farms burn fossil fuels to produce chemical fertilisers; to pump, treat, and move huge amounts of water for animals and irrigating crops; and to process and package their foods. By supporting local food production, you are contributing to the solution.\n\n\n\n\n\n\nWaste is something that is left over, no longer used or wanted, that must be disposed of in some way. Waste can be anything — food, garden rubbish, packaging and containers, clothing, furniture and appliances, anything. Waste also comes from our toilets, washing machines, showers, and sinks.\n\nWe have become a “throwaway” society and people do not necessarily realise where “away” is. “Away” might be the landfill, where rubbish is piled up and mixed; eventually it leaks toxic gases and liquids, polluting the waterways and the air. Landfills also become full and overflow and then new land is sought in order to dump more rubbish. Rarotonga’s current landfill was designed to be a solution until 2020. The outer islands have no landfills.\n\n“Away” might also be waste that is not disposed of properly — left at the beach after a Sunday picnic, thrown out of the car after a ‘feed’, or driven up a valley and dumped illegally. This can end up polluting land, waterways, and the sea, directly affecting the health of animals, the environment, and us.\n\nPeople also get rid of unwanted waste by burning it, a common practice here in the Cook Islands. Burning waste, especially plastic but even leaves and hedge clippings, releases harmful chemicals into the air, and adds to the greenhouse gas emissions affecting our climate. Burning plastics is also prohibited under Section 38 of the Public Health Act.\n\nWaste from leaking septic tanks ends up in waterways, groundwater, and eventually the sea, carrying disease-causing bacteria which make animals and humans sick. Chemicals from household cleaning products or products used for personal hygiene end up in wastewater, which eventually upsets the natural chemical balance of ecosystems — interacting systems of living and non-living things — ultimately leading to breakdown and sometimes irreversible damage. We need not look far for an example of this; we need only to look at Muri lagoon.\n\nRethinking our current methods of waste disposal is the first step we need to take. Just because the item is no longer wanted, it does not mean that it is waste, that it is no longer useful or that there is not a better way to deal with the item. This is not so much a waste management crisis, but a crisis in individual responsibility. People need to accept responsibility for their own waste.\n\nThere are three basic principles to waste management, or “The Three R’s”: Reduce, Reuse, and Recycle. The principle underlying them is changing the way we think about waste.\n\n Angelie Tiare Robinson\n\n\n\n\nGrow your own food.\n\nTake your own plate to the market. \n\nBuy in bulk to reduce the amount of wrappers you’re purchasing\n\nStop using plastic straws.\n\nMake your own:\n\nToothpaste — Mix 5 tbsp coconut oil + 5 tbsp baking soda (use mint to flavour)\n\nDeodorant — Mix 1/4 cup cornstarch + 1/4 cup baking soda + 2 tbsp coconut oil\n\nDrain cleaner — Mix 1/2 cup salt + 4 litres water + heat. For a stronger solution, pour ½ cup baking soda down the drain, then 1/2 cup vinegar.\n\nOven cleaner — Wet surfaces, then spread paste of 3/4 cup baking soda, 1/4 cup salt, and ¼ cup water over surfaces. Let sit overnight and remove with spatula in the morning.\n\nRust remover — Sprinkle salt, then squeeze lime over rust. Leave mixture on for 3 hours.\n\nToilet cleaner — Mix 1/4 cup baking soda + 1 cup vinegar, pour into toilet and let sit. Scrub with brush and rinse.\n\nWindow cleaner — Mix 2 tsp of white vinegar + 1 litre warm water. Use cloth to clean.\n\nTile cleaner — Rub in baking soda with damp sponge and rinse with water. For tougher stains, wipe surfaces with a tiny bit of vinegar first.\n\n\n\n\n\nThough our current waste issues may seem daunting, there are practices that can be carried out by everyone and anyone in order to relieve some of our islands’ stresses. A couple of solutions to help combat our waste issues have been implemented by local environmental organisation Te Ipukarea Society, based on Rarotonga.\n\nThis has been a busy year for Te Ipukarea Society (TIS) in terms of waste management as we were successful in obtaining funds through the Global Environment Facility to tackle waste in several ways. \n\nBiodegradable container promotion \n\nWith polystyrene (styrofoam) containers being used frequently for fast food and takeaways, TIS has begun an awareness raising campaign to promote the use of biodegradable and reusable containers. The Society has been able to source these containers, and also encourage local retailers and wholesalers to make the switch. \n\nWorm farm and compost bin trainings\n\nIn support of the Ministry of Education’s Green Schools Policy, the Society has supplied a compost bin to all primary and high schools in the Cook Islands. Worm farms are also being provided to most high schools.\n\nThe Society provides training on how to build and set up a worm farm and compost bin. They also teach the correct way to “feed” the system, including what can and cannot be placed in the worm farms and compost bins.\n\nThe goal of this project is to promote alternative solutions to dealing with organic waste rather than just burning it or throwing it straight into the bin. Composting and worm farming generate useful things which can be used to help vegetable gardens grow. \n\nRent a plate \n\nAnother solution to container waste was a hygienic washing centre at popular sites. Te Ipukarea Society was able to assist a local school, Te Uki Ou Primary, in establishing a washing centre at the Muri Night Markets. With donations collected for every plate hired out, the school has now created a successful fundraising initiative. \n\nNo to burning rubbish\n\nA common practice within the Cook Islands is to burn general rubbish, which commonly includes plastics. In hopes of discouraging this practice, TIS has created short advertising clips for local TV explaining the health hazards involved with burning plastics, along with highlighting the most appropriate ways to deal with and reduce plastic waste.\n\nWaste management practices can be implemented around the globe. Every little bit helps; we can be the change we need!\n\n Alanna Matamaru Smith\n\n\n\n\n\nThe history of the toilet is really a history of how humans have attempted to solve the unavoidable problem of disposing of smelly and dangerous bodily waste.\n\nEarly on, our ancestors simply walked a good distance away from where they slept and ate. In the subsequent forty thousand years, a number of solutions, both simple and innovative, were developed. Digging a deep pit and then filling it in when it is nearly full is a neat and easy way of putting the waste out of sight and mind, but bacteria and viruses in the waste seep into the ground and then potentially into rivers, seas, and drinking water. That isn’t a problem if you are the only human for miles, but in crowded cities and on tiny islands, we need to find ways of treating the waste so that the pathogens are killed or removed. The ninth President of the United States, William Henry Harrison, is believed to have died after only 30 days in office after contracting enteric fever from the White House water supply which, at the time, was downstream from a public toilet.\n\nThere are also compounds in human waste that bacteria, algae, and other organisms feed off, which can create imbalances in the environment. You don’t need to look far for an example – one contender for the cause of the recent algae bloom in Muri is seepage from waste treatment installations.\n\nSeptic tanks are the commonest solution here in the Cook Islands, but they aren’t without their problems. Older septic systems crack and leak; installing a full new system that is compliant with all the Cook Islands’ regulations on human waste disposal is expensive.\n\nBelieve it or not, human waste is actually useful stuff and it doesn’t take much to turn it from a nuisance into a resource. It is a concentrated nutrient source for plants if properly treated and managed. Urine is usually sterile and can be used immediately on plants by mixing it with plenty of water first. It is possible to buy or build toilets that divert urine to a separate mixer tank that automatically adds water before it is spread via a hose onto the garden. Or, gents, you can simply pee on your banana trees!\n\nFor obvious reasons, faeces can’t be used on the garden immediately, but if you collect them in a chamber with plenty of ventilation and mix in carbon (usually in the form of sawdust), eventually the mixture will decompose, all the pathogens will die off, and you are left with compost that is as good for the garden as anything you can buy commercially. Despite the yuck factor, human waste-based compost is safe to use on food crops. Just don’t tell auntie how you managed to make those pawpaw you gave her grow so big.\n\nCompost toilets are more work than your average flush loo. The compost chamber needs to be managed so that it has the right amount of moisture, and it can get infested with flies or other bugs. It also needs to be changed when it’s full, and the contents should be regularly turned – but these eco-friendly toilets are a great solution for a small island with no overall sewage system.Homes can install them at relatively low cost and even small resorts can use composting toilets if the owners are willing to put in the time and effort to keep them operating well. The resort my wife and I operate, Ikurangi Eco Retreat (www.ikurangi.com), uses four compost toilets and our guests often comment that, whether or not they had reservations at first, they forget it isn’t an ordinary flush toilet within a day. \n\n Matt Scowcroft\n\n\n\n\nWith only two public toilet facilities on the island of Aitutaki, one of which is currently not operational, the members of the Aitutaki Conservation Trust (ACT) saw an opportunity to provide much needed services for locals and tourists while also making positive environmental changes. They decided to install “Enviro Loos” which reduce pollution of the land and lagoon.\n\nAn Enviro Loo is a “dry sanitation system,” meaning it uses no chemicals, valuable water resources, or power. Instead waste is treated through a natural process of dehydration and evaporation, using wind and sun rather than electrical power. These toilets require minimal maintenance and servicing.\n\nACT’s first portable Enviro Loo was purchased in 2013 through the Community Initiatives Scheme. Set on a trailer, it became a portable facility that has been used for school sports days and picnics, family and church gatherings, night markets and Christmas celebrations.\n\nWhile the Enviro Loo fulfilled community needs, its galvanised steel meant that it rusted quickly in the island’s high salt environment. The solution was simple – ACT asked the manufacturer if they could provide the same unit constructed from a more suitable material.\n\nTwo new portable units were recently purchased thanks to funding from Global Environment Facility (GEF) Small Grants Programme and Cook Islands Tourism Corporation. The new loos have been placed at the popular beach areas of Ootu Beach and Base One Beach. Both attract large numbers of visitors ranging from cruise ship tourists and lagoon tour operators to the Aitutaki Sailing Club and paddling associations. They are also a popular location for local community groups to camp overnight or hold picnics and events. Prior to the Enviro Loo, Base One had no toilet facilities.\n\nBoth units are portable and can be taken to evacuation sites in the event of a cyclone.\n\nFuture stages of the project will look at installing permanent composting toilets at the site of the current Enviro Loos. ACT also intends to purchase additional toilets to install at areas such as sports fields, wharf areas and if possible on each of the most frequently visited motu. \n\nSays ACT’s Katrina Armstrong: “Aitutaki Conservation Trust are very grateful to the GEF Small Grants Programme, Cook Islands Tourism Corporation and especially to our community for their continued support of our projects, which aim to help protect our land, lagoon and culture, and for helping to ‘Keep Aitutaki Clean’”.\n\n Rachel Smith\n\n\n\n\n\nOur Rarotonga tai roto, or lagoon, is a ta’onga tapu, apinga aro’a tapu, a sacred gift given to us by our tupuna to respect and take care of, and to pass on to our tamariki and future generations. How can we honour that commitment and fix the critical problem that now threatens our lagoon?\n\nIt starts with each and every one one of us doing our part. We must tread lightly on our lagoon in order to protect all the fish, shellfish, corals, seaweed, and other resources in it. We must make sure that spillage from our septic tanks doesn’t end up in the lagoon and runoff from agriculture does not pollute our lagoon with animal faeces and pesticides. How can we responsibly manage our wastewater on Rarotonga?\n\nThe government and the business community need to step up, especially those who own tourism accommodations. If they want to continue to reap the benefits of their investments, they must also take responsibility for protecting our precious resource.\n\nTwenty-five years ago, before the huge influx of tourists to Rarotonga, Muri and the whole Rarotonga lagoon was pristine. Local people would catch fish, collect kai and shellfish, and harvest remu, seaweed, and matu rori to feed their families. Since about 2001, eating seafood from the lagoon has become too risky for people’s health, and the seafood supply has been greatly reduced. Also, black algal (seaweed) blooms have increased significantly, causing bad odours and unpleasant swimming conditions. \n\nWhat happened? Over-development, ineffective waste treatment, lack of research and environmental management, insufficient financial and scientific resources, lack of education and understanding, and ineffective communication between all those involved have all played a role in the degradation of Muri lagoon. The lagoon has been polluted due to lack of responsible and informed resource management. We are now dealing with an environmental disaster.\n\nSome claim that the situation is improving, but according to well qualified marine biologists, this is most likely a temporary condition that will further deteriorate in the near future. Addressing the consequence doesn’t work long term, we need to address the cause of the lagoon pollution.\n\nWhat do we need to do?\n\nBoth polluted groundwater and raw or untreated sewage contribute to pollution of lagoons, so we first have to fix the source of pollution in Muri, then evaluate what further action is required. This also means getting resort owners to take responsibility and invest in effective wastewater treatment for their commercial properties, and getting Cook Islands government to provide the same for local residents. \n\nWe also need to learn from other Pacific Islands who have the same issues. For instance, Maunalua Bay in Honolulu, Hawai’i, has experienced the same problem, where macro-algal blooms and deterioration of the coral reef has been caused by watershed mud and pollutants being discharged into the bay.\n\nAt Tiahura in Moorea, increased numbers of tourists put pressure on the lagoon for many years, and the luxury hotels there were discharging sewage at midnight from pipes a few metres from the beach in the lagoon, hoping the water currents would take it away. Then 20 years ago scientists noticed that the reef was smothered with macro-algal blooms, caused by wastewater discharge from hotels. Australian marine biologist Dr. Eric Wolanski discovered that the water currents at sea were bringing the sewage back over the reef and the reef was getting overloaded by the sewage. The luxury hotels took no action, until a Qantas manager was told about the issue and phoned the hotels telling them he would stop sending Qantas customers to their hotels. That motivated the hotels to take action and fix the problem by secondary treating sewage, and then selling the water for golf courses. This has contributed to improved health of the lagoon and reef at Tiahura.\n\nIn March 2017, the Cook Islands government announced it will spend $70 million over a 10 year period to manage wastewater issues in Rarotonga and Aitutaki, with particular focus on the impact on our lagoons. The Wastewater Project Management Unit in the Ministry of Finance and Economic Management (MFEM) is formulating a strategy to improve monitoring and scientists’ understanding of water quality issues in Rarotonga’s lagoon. There will be opportunities for the community to engage and workshops will be held at project milestones to provide opportunities for community input.\n\nLet’s all come together and contribute to saving our lagoon before it’s too late.\n\nAuē , te akaroa i ta tatou tamariki!\n\n Dr. Takiora Ingram\n\n\n\n\n\n\n\nAt Te Ara Museum in Muri are four large aquarium tanks.\n\nOne is pristine, noticeably cleaner than the others. Museum founder Stan Wolfgramm calls this the food tank because it contains species eaten locally — kina, rori, ariri. It’s clean because everything in it works together to vacuum and filter algae. The food tank is a window into what’s happening just beyond the shore.\n\n“It was just a matter of figuring out what belongs and what doesn’t,” Wolfgramm said of creating a self-cleaning tank. “What we learnt is that the environment, if you leave it long enough, brings itself into balance.”\n\nThis is the basis of the rā‘ui – a concept that, for centuries, governed the way people interacted with their environment. The early Polynesians understood that taking care of an area or a resource means just letting it take care of itself sometimes. They understood that they had to strike a balance between using their resources and leaving them alone.\n\nAt regular meetings – uipā’anga rā‘ui – village leaders would plan for the months ahead, taking into account the breeding seasons, during which species needed space; special occasions or visits for which extra food would be required; and the likelihood of cyclones, after which resources would be scarce. Once they reached agreement, a chief would announce either a rā‘ui mutu kore – a permanent ban – or a rā‘ui ta tuatua – a ban that could be lifted when appropriate.\n\nPeople honoured the rā‘ui out of understanding, but also out of fear. Breaking the ra’ui could get you sent out to sea in a canoe, beaten, kicked out of your village, or killed, according to Papa Ron Crocombe’s research. Today these punishments seem extreme, but in days before supermarkets, survival depended on a common respect for natural resources.\n\nRod Dixon wrote in a book called The Rahui that the Mangaians referred to their streams as kauvai toto , or bloodstreams. They saw the waterways as veins extending from the island’s heart — productive taro swamps in its centre. People saw the island as a body, a system in which all parts are connected. They understood that pressure on one part of the environment invariably affected another. If the bloodstreams weren’t kept clean, for instance, the blood couldn’t flow to the heart.\n\nIn the modern world, we have moved away from this holistic understanding of how the world works. Many of us don’t consider the interconnections—that chemicals on our plantations cause algal blooms in our lagoons, for example, or that if we kill all the sharks we’re destroying the ecosystems they regulate. \n\nSome pa enua communities still strictly observe the rā‘ui, but for most of us, there was a shift somewhere along the way. When the Cook Islands started exporting crops for profit, planters started timing their harvests around shipping schedules instead of natural cycles. Chiefs were pressured to push for efficiency instead of balance. Chemical fertilisers and pesticides were introduced to encourage bigger, quicker yields. Food resources became profitable first and useful second. On Rarotonga, the rā‘ui was largely forgotten.\n\nIn the 90s, tourism authorities and traditional leaders who were concerned about the health of the lagoon joined together to re-institute the rā‘ui. They sourced funding to put signs up around Rarotonga and several on outer islands. Still, enforcement is tough. Today, the consequences of overusing our resources aren’t as immediate or as severe as they once were. \n\nNow, no matter what’s happening in the oceans, we can still buy fish in a tin. If you ask Tupe Short, a traditional leader and planter from Matavera, convenience is making the world blind.\n\n“We are selling the rights to our fish away for money,” he says. “Money can be spent in no time, and then when it’s all gone, what about our fish? We can’t eat money.”\n\nOur bodies send us messages, like pain, when something isn’t right. Our environment does the same. Weird weather, algal blooms, bleached corals—they are signs of a system in distress. In the modern world, most of us tend to ignore the source of a health problem; we manage the pain with medication so we don’t have to think about what’s really going on. We do the same with the world around us. \n\nWe can only interpret the signs of the earth, sea, and sky if we’re paying attention, the way the Maori always did.\n\n\n\n\n\nScientists and civil society organisations worldwide are concerned about the impacts of deep sea mining (DSM) on the Pacific Ocean and the livelihoods of people living on islands. The people of the Cook Islands should be, too.\n\nAccording to the government, within the Cook Islands EEZ the seabed has 10 billion tonnes of manganese nodules, containing manganese, nickel, copper, cobalt, and rare earth minerals. Companies are interested. The Cook Islands Seabed Minerals Act was adopted by Parliament in November 2009, and the Seabed Minerals Authority (SMA) was established by government in June 2012 to regulate deep seabed mining activities and manage licensing processes.\n\nFor the people of the Cook Islands, there are two areas of concern:\n\n·       First, the impact of deep sea mining on our own marine environment;\n\n·       Second, our liability as a country for implementing deep sea mining exploration licences in international waters of the mineral-rich Clarion Clipperton Zone (CCZ) in the northern Pacific, a 6km-deep undersea plane covering 4.5 million sq. km about halfway between Hawai’i and Mexico. Many Cook Islanders may not be aware that our government has claimed exploration rights to part of this zone.\n\nIt is important that some key issues are considered before we exploit our deep sea minerals.\n\n\nWhat are the impacts?\n\nThere is agreement by international experts that deep seabed mining operations are likely to irreparably harm sensitive underwater ecosystems. We don’t yet understand how deep-ocean ecosystems change when impacted by human activities, and the consequences of these changes. High seas ecosystems are rich with life and diversity and deserve a high level of protection. We should not rush to exploit deep ocean habitats before they can be documented. Funding mechanisms should be established to fund research and conservation initiatives before we decide to exploit our ocean resources.\n\nCurrently, there is no regulatory oversight guiding DSM technology, which will likely raze the deep ocean floor and suck up all the minerals.\n\n\nWho benefits?\n\nBased on past experiences with land-based mining in Papua New Guinea, Fiji, and other countries, we know that very little financial benefit trickles down to the people. In addition, these mining operations have caused social unrest, violence, and environmental degradation in these island communities.\n\nIn the Cook Islands, revenue from DSM will be held in the Cook Islands Sovereign Wealth Fund (SWF) that government has established. As it stands now, the Ministry of Finance and Economic Management will make decisions about where the funds will be spent. What we need is an independent board made up of informed, responsible citizens and traditional leaders who can all contribute to these important decisions for management of the SWF.\n\nThe SPC’s Chief Geoscientist, Dr. Kifle Kahsai, said in 2014: “Historically, mining has negative connotations due to the risks of adverse social and environmental impacts, as well as poor mining revenue management associated with some land-based mining operations.” He also warned the Cook Islands government to make sure that revenues generated by seabed minerals improve the livelihoods of all Cook Islands people.\n\n\nDSM in the High Seas\n\nThe Cook Islands government is eager to exploit habitats in the CCZ in the northern Pacific before scientists have a chance to explore and document these ecosystems. Little is known about the deep seabed, and no conclusive environmental study has yet been completed. What is known is that the life that thrives in this unusual environment is sulfur-based rather than oxygen-based, and we do not know how sulfuric discharge or slurry will impact ocean biodiversity.\n\nIn July 2014, the government-owned enterprise, Cook Islands Investment Corporation (CIIC), and GSR, a Belgian company, were granted an exploratory licence in the mineral-rich CCZ by the International Seabed Authority (ISA) to explore for polymetallic nodules in a reserved area in international waters. This exploratory licence is for an area of 75,000km², about two-thirds the size of New Zealand’s North Island. Our government claims that the Belgian company covered the application costs, and will cover all the exploration costs.\n\nHowever, do we know anything about the Belgian mining company’s record with exploitation of mineral resources elsewhere in the world, and what does the company expect in return? What is the Cook Islands government giving away in exchange for this?\n\nOur people have not been fully consulted on the risks and implications of DSM in international waters. What does this mean for local people and communities in terms of rights and responsibilities, especially if there is an environmental disaster in the CCZ, in international waters, or in the high seas? Who will be held liable? How can the Cook Islands plan for and mitigate this? What are the best strategies to communicate these complex issues to local communities?\n\n\nDSM within the Cook Islands EEZ\n\nWhile the Seabed Minerals Authority (SMA) has done some community consultation, it is not enough. People have been told about the likely billions of dollars of revenues, but not the possible environmental costs and liabilities. A legal expert from SPC made it clear in 2014 that in the case of any environmental disaster, the Cook Islands government, and therefore the Cook Islands people, will ultimately be responsible for any costs.\n\nWhat is needed is an independent assessment of what local people and communities want, carried out by a team of both international and local experts, not conducted by the SMA.\n\nLocal people and communities need to be asked whether they want large, foreign, multinational companies exploiting these resources at the risk of our ocean environment and nation. What are the likely social and environmental impacts and challenges? Are we willing to commit our economic, environmental and social future to this risky venture, and should we be committing future generations to it also?\n\nOur ancestors treaded softly on our environment and put our people first. Today’s decision-makers should do the same. We have traditional laws and protocols for managing the environment that must be respected by both government and foreign investors.\n\n Our government is promoting ocean conservation on the one hand, and on the other exploitation of ocean resources (both fisheries and DSM). It’s important that the Cook Islands people, not the government, make decisions about the management of our ocean resources. We should not allow government to sacrifice our people’s health, livelihoods, culture, and our marine environment for financial gain.\n\nLet’s join with others around the world who are saying no to deep seabed mining before more is known about its impacts. In May 2017, many worldwide welcomed Apple’s commitment to no longer mine the deep ocean.\n\nLet developed countries explore DSM in their waters, then watch what happens, and learn from their mistakes.\n\n Dr. Takiora Ingram \n\n\n\n\nReporter: Kia orana Noddy. What a great privilege to be able to meet you and get to know you better.  I realise there have been more people that have gone to space than have been to where you are from.\n\nNoddy:  Kia orana. Yes, humans need some pretty advanced technology to reach us. We got some humans in the 70s and we’ve had sporadic visits since then. Now we hear the humans are interested again. Looks like a good number of us will be entering the oxygen atmosphere.\n\nReporter: Why do you think people are interested?\n\nNoddy:  People are interested because we’re valuable. We’re nervous this time, though. The first visits were Exploratory — we and our home were being studied. Soon, the visits will be Exploitative.\n\nReporter: You sound concerned.\n\nNoddy:  Well, there’s a lot going on in the ocean – it’s being affected by climate change and human-made pollution. What set of problems will be added to those when we are being moved from our environment? I mean, us nodules are a large part of our ecosystem and there are other species that we support just by existing. So when we are removed, there will be change at home. I still don’t know if that can be positive in any way. I’m told that my value has the possibility of improving many of the lives of people on land communities in my area. Of course I want to help improve the world, but am I the only beacon of help for these communities or are there other ways their lives can be improved, until the problems in the ocean are not as critical as they are now?  \n\nReporter: So how do you think the humans should proceed?\n\nNoddy:  Because we are such a unique environment, and one of the last frontiers explored, with new species being discovered as we speak, I would want research to continue on the deep seabed. I’d want humans to find out more about our area and how all species impact and interact with each other. I’d want them to demonstrate that they can make the changes necessary to stop polluting and contributing to the rate of climate change, so that I’d know they were serious. This shouldn’t be much to ask and expect. The benefits of deep sea nodule extraction should benefit all stakeholders, even the ones formed of minerals.  I mean, everything on this earth was put here for a reason and it should not only be looked upon for human gain only, right?      \n\nTeina Mackenzie", "pred_label": "__label__1", "pred_score_pos": 0.9146386384963989} {"content": "Mitochondrial diseases could be treated with gene therapy, study suggests\n\nMitochondrial DNA\nMitochondrial DNA. Credit: en.wikipedia.org\n\nResearchers have developed a genome editing tool for the potential treatment of mitochondrial diseases: serious and often fatal conditions which affect 1 in 5,000 people.\n\nThe researchers, led by the University of Cambridge, applied an experimental gene therapy treatment in mice, and were able to successfully target and eliminate the damaged DNA in mitochondria which causes the devastating conditions.\n\nTheir results, published in the journal Nature Medicine, could provide a practical route to treating patients with these diseases and may provide a future alternative to , or 'three-parent IVF'. This is the first time programmable genome engineering tools have been used inside a living animal, resulting in such significant modification of DNA.\n\nMitochondria are the powerhouses inside our cells, producing energy and carrying their own DNA. They are inherited from a person's mother via the egg, but if they are damaged, it can result in a serious mitochondrial . For example, MELAS Syndrome is a severe multi-system disorder causing progressive loss of mental and movement abilities, which usually becomes apparent in early childhood.\n\nThere are typically about 1000 copies of mitochondrial DNA per cell, and the percentage of these that are damaged, or mutated, will determine whether a person will suffer from mitochondrial disease or not. Usually, more than 60% of the mitochondrial DNA molecules in a cell need to be mutated for the disease to emerge, and the more mutated mitochondrial DNA a person has, the more severe their disease will be. Conversely, if the percentage of mutated DNA can be reduced, the disease could potentially be treated.\n\nMitochondrial diseases are currently incurable, although a new IVF technique of mitochondrial transfer gives families affected by mitochondrial disease the chance of having healthy children—removing affected mitochondria from an egg or embryo and replacing them with healthy ones from a donor.\n\n\"Mitochondrial replacement therapy is a promising approach to prevent transmission of mitochondrial diseases, however, as the vast majority of mitochondrial diseases have no family history, this approach might not actually reduce the proportion of mitochondrial disease in the population,\" said Dr. Payam Gammage, a postdoctoral researcher in the MRC Mitochondrial Biology Unit, and the paper's first author.\n\n\"One idea for treating these devastating diseases is to reduce the amount of mutated mitochondrial DNA by selectively destroying the mutated DNA, and allowing healthy DNA to take its place,\" said Dr. Michal Minczuk, also from the Medical Research Council (MRC) Mitochondrial Biology Unit, and the study's senior author.\n\nTo test an experimental gene therapy treatment, which has so far only been tested in human cells grown in petri dishes in a lab, the researchers used a mouse model of mitochondrial disease that has the same mutation as some human patients.\n\nThe gene therapy treatment, known as the mitochondrially targeted zinc finger-nuclease, or mtZFN, recognises and then eliminates the mutant mitochondrial DNA, based on the DNA sequence differences between healthy and mutant mitochondrial DNA. As cells generally maintain a stable number of mitochondrial DNA copies, the mutated copies that are eliminated are replaced with healthy copies, leading to a decrease in the mitochondrial mutation burden that results in improved mitochondrial function.\n\nThe treatment was delivered into the bloodstream of the mouse using a modified virus, which is then mostly taken up by heart cells. The researchers found that the treatment specifically eliminates the mutated mitochondrial DNA, and resulted in measures of heart metabolism improving.\n\nFollowing on from these results, the researchers hope to take this gene therapy approach through clinical trials, in the hope of producing an effective for .\n\nExplore further\n\nHow incurable mitochondrial diseases strike previously unaffected families\n\nMore information: Payam A. Gammage et al, Genome editing in mitochondria corrects a pathogenic mtDNA mutation in vivo, Nature Medicine (2018). DOI: 10.1038/s41591-018-0165-9\nJournal information: Nature Medicine\n\nCitation: Mitochondrial diseases could be treated with gene therapy, study suggests (2018, September 24) retrieved 18 January 2021 from https://medicalxpress.com/news/2018-09-mitochondrial-diseases-gene-therapy.html\n\nFeedback to editors\n\nUser comments", "pred_label": "__label__1", "pred_score_pos": 0.5689346194267273} {"content": "Quick Answer: How Do You Not Lose Gains When Injured?\n\nHow do you not lose muscle when injured?\n\nThe following tips will help you minimize muscle loss following an injury.Rest Long, Rest Often.\n\n\nConsider Supplements.\n\nGet in the Water.\n\nGet Hot..\n\nWill I lose gains after a week off?\n\nIf you take a few weeks off from exercising, your muscle strength won’t take much of a hit. … However, as mentioned above, athletes can start losing muscles after three weeks of inactivity. You lose cardio, or aerobic, fitness more quickly than muscle strength, and this can start to happen in just a few days.\n\nHow do I regain lost muscle mass?\n\n\nHow do you fight muscle loss the times?\n\nHere’s how to prevent muscle loss as you age:Eat protein-rich foods. Studies suggest adults can lose up to 8 percent of muscle mass each decade after age 40.Hit the gym. … Sleep. … Don’t cut carbs. … Get enough vitamin D. … Limit your alcohol intake.\n\nCan you build muscle at 70 years old?\n\n\nHow do I know if I’m losing fat or muscle?\n\nIf you’re losing weight but your body fat percentage is staying the same, it’s probably a sign you’re losing muscle. “Your body won’t shape the way you want. You’ll notice shrinking circumferences, but the pinch-able fat is the same,” says Dr. Nadolsky.\n\nWhat should you eat to maintain muscle?\n\n\nWill a week off the gym hurt?\n\n\nCan you lose muscle after gaining it?\n\nSome athletes see a loss of about 6% muscle density after three weeks. Some power lifters see losses of as much as 35% after seven months. Young women who trained for seven weeks and gained two pounds of muscle mass, lost nearly all of it after detraining for seven weeks.\n\nWhat exercises should seniors avoid?\n\n\nWhy am I losing muscle fast?\n\n\nCan you lose muscle in a week?\n\n\nWill 2 weeks off gym muscle loss?\n\nContrary to what you may have heard, you won’t lose muscle or strength if you take a week or two off from the gym. It takes a while to build muscle, and it doesn’t just disappear the second you stop lifting. Take more than three weeks off, though, and you will probably lose some strength and muscle.\n\nHow do you maintain strength when injured?\n\n5 ways to maintain muscle when you’re injuredRest of the weak. If you ever want to be back to full strength, you need to rest up properly. … E-sy does it. … Swim for success. … Break a sweat. … Train around it.\n\nAt what age does muscle growth stop?\n\n“Muscle mass peaks around age 40. [Then it] begins to decline due to sarcopenia,” explains Pete Rufo, a performance coach at Beast Training Academy in Chicago. “A major contributor to muscle mass decline is lack of exercise and sedentary lifestyles.\n\nHow do you know if your losing muscle?\n\n\nHow long can you go without lifting before you lose muscle?\n\nAnswer: Contrary to popular belief, your muscles don’t turn to mush as soon as you stop lifting. In fact, a recent study of recreational weight lifters found that 6 weeks of inactivity resulted in only a slight decrease in power (10 percent after 2 weeks) and virtually no drop-off in size or strength.\n\nHow long does it take to get fit again?\n", "pred_label": "__label__1", "pred_score_pos": 0.6430090069770813} {"content": "Chaldean and Neo-Platonic Theology\n\nKatelis S. Viglas\n\nIhr Städte des Euphrats!\nIhr Gassen von Palmyra!\nIhr Säulenwälder in der Ebne der Wüste,\nWas seid ihr?\nEuch hat die Kronen,\nDieweil ihr über die Grenze\nDer Othmenden seid gegangen,\nVon Himmlischen der Rauchdampf und\nHinweg das Feuer genommen;\nJetzt aber sitz ich unter Wolken (deren\nEin jedes eine Ruh hat eigen),\nund fremd\nErscheinen und gestorben mir\nDer Seligen Geister.\nFriedrich Hölderlin, Lebensalter\n\nAbstract: In the present paper, the meanings the term “Chaldeans” obtained during the Antiquity and the early Middle Ages are presented, but mainly the role the Chaldean Oracles played inside the movement of Neo-Platonism is emphasized. The stratification of Being according to the theology of Chaldean Oracles, suggests a reformation of the ancient Chaldean dogmas by the Neo-Platonists. The kernel of this paper is the demonstration of the similarity between the name “En” that the ancient Babylonians used as the first part of many compound words for their gods, with the One (Ἕν=En), the first theological principle in the Neo-Platonic system. Yet, a comparison between the Chaldean theology and the Plotinian views on Mysticism and religiosity follows. As it is well known, the later Neo-Platonism will be led to the creation of a way of thought and practice as impacts from the ancient tradition.\n\npdf PDF     Key words: Chaldeans, Oracles, Neo-Platonism, Plotinus, Theology, Ancient Religions.\n\n\nThe name “Chaldeans” refers generally to the Chaldean people who lived in the land of Babylonia,[1] and especially to the Chaldean “magi” of Babylon.[2] The Chaldeans were connected to Neo-Platonism, the philosophical movement founded by Plotinus in the 3rd century A.D., through the dark and strange verses entitled Chaldean Oracles or Chaldean Logia. The disciples and successors of Plotinus commented on these verses, put them into the curriculum of their schools, and proceeded to the implementation of their teachings to the theurgic rituals. Although the direct continuity of the religion of the Sumerians, the Accadians, and the Babylonians into the era of Neo-Platonism is disputed, there is some evidence, mostly of religious character, which could lead towards such a direction. The evolution of Theurgy after the time of Plotinus and the revival of the ancient Chaldean magic are complex issues, which will be examined briefly here. Rather, we are going to explore the Neo-Platonic view of the ancient Chaldean theology through the Chaldean Oracles. The main argument of this paper is related to the indeterminacy of the first principle’s name and the homonymy of the prefix “En” of some Babylonian gods with the Neo-Platonic One (En). Furthermore, we are going to compare the meanings of the first principle as they developed inside the frames of the ancient Chaldaism and the Neo-Platonism. The point of view is that the primary unifying and undefined nature of the name “En” did not disappear, but remained in memory, coming from the depth of time. Yet, we detect evidence for supporting the view that Plotinus had a partial knowledge of many Chaldean and other Eastern doctrines, which are latent in various forms in his work. The approach proposed here is based on the highlight of the historical-philosophical dimension of the subject and on the elaboration of data from the history of ideas, names, and beliefs.\n\n\nThe “Chaldeans” were the guardians of the sacred science: the astrological knowledge and the divination mixed with religion and magic. They were considered the last representatives of the Babylonian sages, of whom the pre-scientific information passed into the ancient world and maintained until the Middle Ages.[3] They were the first mathematicians and the way they treated the numbers had a degree of simplicity, consistency, and abstraction, which never was going to be surpassed.[4] They appeared in the third millennium BC[5] and for the first time they were led to a global synthesis of the information they held, making the vision of unification of knowledge possible. Henceforth, they are the inspirers of every similar effort. They lived in the land of the Sumerians and the Accadians, making Babylon the home of the ancient wisdom. Their language was probably Acadian, from which the Babylonian, Assyrian and other languages derived, but maybe they expressed themselves in Sumerian, which differs in the verbal roots, the suffixes and prefixes, as an “Asianic” language.[6]\n\nIn Classical Antiquity, the name “Chaldeans” primarily stood for the priests of the Babylonian temples. The Greek historian Diodorus Sicilus compared them with the Egyptian priests.[7] Since the word “Chaldean” used for members not only of the Babylonian priesthood, but for all the Mesopotamian sages,[8] soon enough it became a title of honor for the Greeks who studied in the Babylonian schools. In the era of the prophet Daniel, the word “Chaldean” meant “magic”, while it is mentioned that the magician Balthazar of Nebuchadnezzar II’s court was the “lord of the incantations” («ἄρχων τῶν ἐπαοιδῶν») and the interpreter of dreams.[9] In Hellenistic times, the term “Chaldeos” was synonymous with the words “mathematician” and “astrologer”. However, in the Roman times the term had already acquired negative connotations.[10] The Byzantines believed that the origins of magic and pagan religion went back to Africa, and the tribes founded by the sons of Noah, Ham (his tribe spread in Babylonia, Persia and India) and Japheth (his tribe spread in Greece).[11] In Byzantium dominated the view that there are not all people able to communicate with supernatural forces. Thus, they believed that there are some chosen nations, like the Egyptians, the Babylonians, the Assyrians, the Jews, and the Persians, which are loved by the spirits. The reason for this love is that these nations were on earth when the demons lived here. The Byzantines did not separate the kinds of religions of these peoples, but they considered them “creators of statues, interpreters, and participants in mysteries” («ποιηταὶ ἀγαλμάτων καὶ ἐξηγηταὶ καὶ τελεσταὶ μυστηρίων»).[12] From the Old Testament it was known that Abraham traveled up and down Mesopotamia, Canaan, and Egypt. However, the view prevailed that the Biblical Patriarchs were not descendants from the land of Canaan. In Genesis it is written that Abraham came from the Ur of the Chaldeans.[13] The Christians did not consider Abraham as a magician and an astrologer, but as a true astronomer and an augur under the guidance of God.[14] From a point after on, the term “Chaldeos” became synonymous with the diviner and the sorcerer, the one who practices the occult sciences. The Church Father John Chrysostom (349–407) complained that the Babylonians practiced debauchery and black magic.[15] In the 11th century, the Byzantine scholar Michael Psellos, during his controversy with the Ecumenical Patriarch of Constantinople Michael I Cerularius (1000–1059), accused his opponent of “Hellenism and Chaldaism” («ἐπ’ ἑλληνισμῷ και χαλδαϊσμῷ»).[16] Generally speaking, the name “Chaldeans” had a prestige, but it was connected with magic and quackery during the Middle Ages.[17]\n\nThe verses of the Chaldean Oracles do not directly originate from the ancient Chaldea. It is well known that they were written in the 2 century AD during the reign of Marcus Aurelius. The sources refer to two Juliani, father and son, as writers, under the names “Chaldean” and “Theurgist” respectively, who practiced the magical arts to gain contact with the divine. Probably, the Chaldean Oracles were created through the theurgic technique practiced by mediums (channeling), a form of spiritualism. The later is found in the Babylonian prophecy and the ecstasy of the Assyrian followers of Ishtar and Hecate. The Chaldean Oracles influenced the Neo-Platonism, because the latter had already partly accepted the dogma of Zoroastrian dualism in the 2nd century AD. The Middle-Platonist philosopher Numenius, who influenced the early formation of the Neo-Platonism, and lived in the city of Apamea,[18] was a radical dualist. Searching for the direct revelation of truth, Numenius was of the opinion that there is a harmonious relation of Platonists, Pythagoreans, Brahmans, Jews, Persians and Egyptians,[19] and he was favorably disposed to accept the Chaldean Oracles. Also, the teacher of Plotinus, Ammonius Sakkas, who is credited with the first teaching of Neo-Platonic doctrines, had awakened the interest of his students in Zoroastrianism. Thus, Plotinus decided to travel to Persia, and to learn the doctrines of the sages of this country. Moreover, Origen, a student of Ammonius (questionable whether he was the Christian Origen or another Platonic Origen), reproduced the doctrines of the Zoroastrians in his work On Daemons,[20] and a third student, Antoninus, cites a Persian doctrine for the cognitive principles.[21] Porphyry, Plotinus’s favorite student, was aware of the Chaldean Oracles, and supplied them with comments – which have not survived – in which he tried to harmonize the Chaldean wisdom with the teachings of Neo-Platonism.[22] Iamblichus, another Neo-Platonist, considered Chaldean Oracles particularly significant and he was the author of a now lost commentary on them. In his work On the Egyptian Mysteries, he described the means of union with God, [23] and raised the Chaldean Oracles to supreme authority. He believed that the latter surpassed the works of Plato. Actually, he did think that the Chaldean Oracles really convey “the Assyrian ancestral doctrines” («τὰ Ασσυρίων πάτρια δόγματα»).[24] The philosophers of the School of Athens considered the Chaldean Oracles as works of theologians and the culmination of studies. Nevertheless, according to these philosophers, the student owed to approach the Chaldean Oracles only after careful research on the works of Aristotle and Plato.[25]\n\nAlso, the connection of the Chaldean Oracles with the followers of Zoroaster – a religion spread in Mesopotamia in the 2nd millennium BC onwards – appeared in the literature of Antiquity and the Middle Ages. This connection can be found in the manuscripts of the Neo-Platonic scholar George Gemistos Plethon in the 15th century.[26] In these manuscripts there are comments on the Chaldean Oracles by Proclus and Michael Psellos. However, only the comments of the latter were completely maintained.[27] Plethon’s main objective was to acceptably present his theological otherness. Thus, he replaced the pagan deity Hecate with the person of Zoroaster, connecting the Chaldean Oracles with the asceticism of the Chaldeans. The introduction of Zoroaster in the history of Western Esotericism created a historical continuity of Theurgists from the ancient Chaldea or Persia until the Juliani, the Sufi mystic Shahab al-Din Suhrawardi,[28] and Plethon. Although this continuity cannot be confirmed as to the truth of its origin, eventually feed the stream of European magic until nowadays.[29]\n\nDespite all the above, the Chaldean magicians of Babylon cannot be identified stricto sensu with the creators of the Chaldean Oracles. Thus, the latter cannot be considered as a god given wisdom derived without interruption from the third millennium BC. Nevertheless, probably the Chaldean Oracles carry excerpts from the ancient Chaldean knowledge, the value of which was very important to be completely lost without a trace.[30] Some scholars considered the emphasis given to the Chaldean Oracles from the movement of Neo-Platonism as a gradual transition from philosophy to magic and religiosity.[31] The answer to the question of God was necessary to be given as much with meditation and research, as through a revealed truth, complemented with the practical implementation of ritual (Mystery Religions). Thus, the choice of the Chaldean Oracles can be explained due to their religious impact and their relation with the internal composition of the Neo-platonic movement. The Neo-Platonists connected the Chaldean Oracles with the ancient Chaldeans, obtaining a prestige coming from the East and legitimizing their existence as bearers and successors of an ancient tradition.\n\n\nThe first god of the Chaldean Oracles is identified with the Paternal monad and it is supposed that he reigns silently from the abyss, from where he created the world with the Power and the Intelligence. The Power is usually identified with the Son, the central element, while the Intelligence is equivalent to Hecate. Hecate is the live fire, and is identified with the Soul of the World,[32] a third god which has an intermediate position, separating and joining the two first hypostases, also called “Once and Twice beyond” («Ἅπαξ καὶ Δὶς ἐπέκεινα»). However, from the content of the fragmentary verses of the Chaldean Oracles it can sometimes be inferred that the Intelligence is the second demiurgic god and the Power is identified with Hecate. The first triad corresponds to the world of supramundane light and it is absolutely inconceivable and eternal.\n\nThe Chaldean Oracles attributed to Iynges, which are a kind of messengers or the thoughts of God, the same role that Plato attributed to demons. Furthermore, Iynges can be corresponded to the Platonic Ideas and they form a triad, along with the Maintainers («Συνοχεῖς») and the “Teletarches”. Demons may be good or bad or irrational. They appear during the ceremonies, having the ability to convert the soul. These mediating creatures live in the intelligible world and they are characterized by power and exceptional abilities.[33] This second triad is placed in the empyrean zone, having a beginning but not an end.\n\nAs regards the hypostasis of the Soul, it has a mediating and ascending role. When the Soul fell to the bodies, it was forced to become a slave of them. By descending to the bodies, it became captive of the matter, but without ceasing to be a fluid reality, maintaining a non-fallen part of it in the intelligible world. Ultimately, it is destined to reach the place of its origin, the heavenly vault, escaping from the oblivion of the sensible world. This return causes to the soul so great happiness that she is ravished. The soul during its ascent is divested of the earthly vestments («χιτώνες»), or spirits or vehicles, chanting the paean, and it achieves the salvation.[34] It lies to the soul to abandon the herd existence, which is subjected to Hemarmene. Its aim is the dominance of the passions and the rise with the help of Theurgy, which may even save the body, this mortal enclosure of “bitter matter” («πικρᾶς ὓλης»).[35] The upper region of the Soul is ethereal, encompassing the Noeric («Νοεροί»), the Cosmagogical («Κοσμαγωγοὶ»), and the Relentless («Ἀμείλικτοι»). The importance of fire is highlighted here, as it is opposed to the material darkness.\n\nBeneath the Soul there is the material world, where the Demiurge – who is called “Hypezokos” or the Flower of Fire – and the Mother Earth reign. Here the higher demons, the human souls, the elementary or lower demons (fiery, aerial, ethereal, and aquatic), and the evil demons have their dwelling. Finally, the underworld for the Chaldeans was the post-mortem world, located inside the earth. The underworld is the home of the sinful souls, which extend their sentences after death in a kind of first matter. In fact, this world corresponds to Tartarus.[36]\n\nA fundamental dualism between the material world and the world of the intelligence dominates in the theology of the Chaldean Oracles. Moreover, their demonology and their attribution of the cause of evil to matter imply pessimism about the human being. Thus, their cosmological dualism corresponds to an ethical attitude since the matter is identified with Hades and his demons. The oriental condemnation of the sensible world is obvious,[37] more than it is in the Neo-Platonic thought.[38] Furthermore, according to the Chaldean Oracles the descent and ascent of the Soul imply that it is not something stable, where the experiences are recorded, but a “wanderer of the metaphysical world” (in the Neo-Platonic sense).[39]\n\n\nThe first principle according to Neo-Platonism, the One, has the position of a name that implies domination and power. Perhaps, it could be compared to the word “En” of the ancient Chaldeans and Babylonians, as in their cuneiform scripture means the Lord or the Priest.[40] There are many elements that lead us to believe that this homonymy is not just a coincidence. Originally the Babylonian word “En” attributed to the very high priest or priestess of a deity who protected a Sumerian city-state – position which involved political power. Perhaps, it was the original title of the leader of Uruk, one of the first cities in history. The word “En” was used even in the Amarna Letters of 1350 BC for the word Bêlu, while it was a formal salutation of Pharaoh, meaning “king”.[41] Also, a name often given to the divine by the Babylonians is a circumlocution with the prefix “En”: En-lil (master of storm), En-Zu (lord of knowledge). Also, En-lil was the god of the waters of the Abyss, which is written in Sumerian En-Ki, having also as a component the word “En”. The symbolism of this god derived from the Sumerian-Akkadian mythology and cosmology, according to which the earth had the form of a plateau that once sank into the abyss of waters. [42] The son of this god, the Marduk, was represented by the “solar bull”, and he dominated in the Babylonian pantheon of the second millennium.[43]\n\nThe Neo-Platonist philosopher Damascius (6th century AD) has noted that the Babylonians knew that there was a single authority for all that is the One.[44] Also, the Neo-Platonist philosopher Proclus in his Commentary on Parmenides (Ὑπόμνημα εἰς Παρμενίδην) supported the view that the Chaldeans (the true theologians) called the first principle Ad, which meant “one”, and Adad, which meant “one-one”.[45] The Once beyond («Ἂπαξ επέκεινα»),[46] the first principle of the Chaldean Oracles, goes back to Ad, while the god Adad was equivalent to Twice beyond («Δίς ἐπέκεινα»),[47] the creator of the intelligible world. The word Adad is connected with the Assyrians, in a passage of Macrobius (early fifth century AD), where it is emphasized that these people worshiped the power of the sun, which they linked to the highest and greatest god (summum maximuque), called Adad. [48] The word Adad or for the accuracy Addu, is one of the fifty names given to Marduk, in the ancient Babylonian epic Enûma Eliš, and the link between Marduk and the sun is plausible in the interpretation of his name as Māri Utu, son of the Sun.[49] In addition, Marduk is equated with the god Aššur, so called in many Assyrian and Babylonian texts. The god Aššur is also written Aš which means “the One”.[50]\n\nAlso, the god Adad was at top of the pantheon of many Syrian cities, where he was commonly called Bel. In Apamea of Syria, the Chaldeans were identified with the hieratic class of the religion of Bel, who corresponds to the Greek god Zeus. An inscription from the Roman Palmyra mentions the word KLDY, which reads as “Chaldeans”. But also a Greek inscription on an altar of Apamea from some Sextus Varius Marcellus, which refers to the “logia in Apemea”, is considered to be related to the Chaldean Oracles.[51] In Apamea lived Amelius, the disciple of Plotinus and Iamblichus, who continued the tradition of the Chaldean Oracles.[52]\n\nThe phenomenon of the syncretism of goddesses was common in antiquity. A god could have more than one name, even if this is confusing at least to us. Damascius refers that the “Twice beyond” («Δίς ἐπέκεινα») that is the Demiurge God, exists as completeness and the source of all beings, and he is called Zeus. This god is equivalent to the universal principle or hypostasis, which produces all other hypostases.[53] According to Damascius, there is an ambiguity between the primary hypostasis and those derived from it, even if all are called with the same name. Thus, there is a diffusion of one hypostasis to another since they are interdependent and are subjected to the first hypostasis. The three hypostases of the primary triad were named with the same or different names, as the god Aššur was illustrated with more than one wings and forms.[54]\n\nThe ancient Babylonians had a wide pantheon and a special attachment to the names of their deities. They believed that by the use of their names, the gods interfere, making the magical-religious practices to be successful. If one possessed the true name of God, it was believed that he could influence the God himself.[55] The same happened with regard to the gods Isis and Osiris. The Egyptians considered that the “name” (ren) has a significant relationship with what it was named. The essence of a god, a human being or a sensible thing, was contained in its name. The Egyptian sacred names had a theurgic power that could reveal the divine reality.[56] This syncretism of the names of the deities, on the one hand seems to support the view of a “theological koine” between the peoples[57] in the ancient world, and on the other hand indicates the obvious indeterminacy of the divine level.\n\nThe ancient Chaldeans considered the true name of God as much unspeakable and ineffable, as unapproachable was the divine level itself. Equally, the Neo-Platonists viewed the first principle as ineffable and unapproachable through the knowledge; the only approach to it was through the mystical experience. Also, the indefinite and numeric name given to the first principle implies its nameless nature. Plotinus himself stated that we do not find the true, but the potential name of the first principle.[58]\n\n\nIt is a plausible conjecture, that the philosopher Plotinus was aware of the Babylonian doctrines, because of his journey to Persia, following the campaign of the Emperor Gordian.[59] If Plotinus actually talked to the representatives of the Babylonian people, he would have heard them mention the name “En” for their rulers and their priests and as a prefix for their gods. Thus, he would be related with the Chaldean doctrines not only through his successors, who commented on the Chaldean Oracles and link them to Theurgy, but more directly, as a hearsay witness of the ancient tradition. If Plotinus had some Chaldean knowledge, as much as he did not keep secret the teachings of Ammonius Sakkas,[60] as he would include this information in his oral teaching – although there is little literary evidence, which could lead to such a conclusion.[61] Moreover, it is believed that his student Amelius Gentilianus, previously a student of Numenius from Apamea in Syria, returned again in this city,[62] attracted by the cult of the god Baal, before the bishop Marcellus destroyed the temple in 380 AD.[63]\n\nAs Porphyry noted in On the Life of Plotinus (Περὶ τοῦ Πλωτίνου Βίου), his teacher did not often visited temples and religious rites.[64] Plotinus’ personal experience suggests that he aimed for directness, which the participation in temples and rites could not ensure. Nevertheless, he compared the mystical union with a man who enters into a sanctuary and leaves behind the statues in the outer shrine, so as the initiate to see and to become in ecstasy with the divine.[65] Thus, he said that a wise priest, who understands the truth of mystery, may make the contemplation real by entering the sanctuary. But even if he has not been there, and thinks that this sanctuary is something invisible, and the source and the principle, he will know that he sees principle by principle and that the similar is united with the similar.[66] The goal is to capture the divine, which is reflected in the soul and the mind.\n\nChaldean’s theory of ascension implies a union of the initiative with the divine. In Chaldean Oracles the ascension is guided by the goddess Hecate, who leads to the first principle. The Chaldeans, the Neo-Platonists, and other sects and groups shared the widespread belief that the stars are deities.[67] Nevertheless, the ancient Chaldeans were considered the founders of astrology. Even the Theurgists considered the process of ascension as a journey to the skies through the magic-religious acts. For the Chaldeans, the stars are self-willed divine beings in the skies and are affected by the theurgic ceremonies to satisfy the human desires.[68] According to the Neo-Platonists, the soul was initially embarked on the illuminated cosmic boat of the sky for descending into the world of senses.[69] Next, it followed the spinning of the cosmic spindle and it boarded an individual boat,[70] which defined its fate in the world.[71] By boarding its “vehicle”, the soul would be exposed to the environmental influences and the inevitability of fate.[72] Eventually, it would be renounced its corporeality, which in no way could by nature to accept it forever.[73] The soul is incorporeal and immaterial, and as a substance and a hypostasis does not communicate itself with the body. It is the energy of the soul that makes the bodies to move and to act. The incorporeal entities vitalize the bodies through their actions.[74] In the Neo-Platonic metaphysical system there are not only the human souls, but the “greater kinds” («κρείτοννα γένη»), i.e. gods, angels, archangels, demons, and heroes as well.[75] The souls of all these beings move in an intermediary space between the earthly and the unearthly place. Nevertheless, some Neo-Platonists believed that the soul does not fall as a whole into the bodies, so as to derive more power for its metempsychosis and for its astral journey.[76] In any case, the human being keeps the possibility of freedom hoping to return to the divine kingdom.\n\nAncient Chaldeans’ magical practices consisted of a formula and of specific acts, which properly repeated in a ritual.[77] Babylonians, Egyptians, and Neo-Platonists attempted to give names to the divine, based on the theory of sympathy and the panpsychism, according to which the heaven is reflected on the earth: every action here has implications in the upper world,[78] the stars and the supernatural beings. Neo-Platonists used various theurgic objects, which they connected to the metaphysical level. In Neo-Platonic Theurgy the objects have symbolic meanings, they are cosmic tools.[79] These objects symbolized the deities of the world beyond, where the initiate’s soul intended to travel. The doctrine of sympathy of all things goes back to the Chaldeans and is related to the Neo-Platonists, who mainly drew from the pantheistic conception of nature and the determinism of the Stoics.[80]\n\nChaldean magician’ instrument of knowledge is extended outwardly in order to receive the divine light. The Chaldean and the Theurgist used the fire, aiming at the attraction upward during the initiation ceremony. Sometimes the fire is identified with the god himself that is the Paternal Monad of the Chaldean Oracles, which affected the initiated. The mysterious power of the fire, which the second god creator carries to the sun, gives light to the planets. Thus, the initiate becomes part of the harmony of the whole; he is connected with the secret ray of god and the repetitive rotation of the sun. In ancient Babylonian and Hellenistic theology, the sun has a special role, it approaches the divine kingdom. According to the Chaldean Oracles the sun is the heart of the world, the generator of life. Its rays clean the soul of the initiate, making him to join with the primary light.[81]\n\nThe Neo-Platonists extensively used the image of light, to the point of developing an aesthetic of light. Furthermore, they often linked the One as Good to the sun, which spreads its rays to the world. The Neo-Platonic philosophy led to a vision of the divine level by using logical categories, concepts and many poetic images. The Chaldeans Theurgists used magic names, “sunthēmata” and “symbols” to influence the divine.[82] Nevertheless, an identification of the seeing subject with the seen object was presupposed to achieve the vision of the One as an illumination of the soul. In this way a higher totality can be formed. The Chaldeans believed in an outside illumination of the human being based on rites, while the Neo-Platonists mainly believed in an internalization of the light. Nevertheless, both ultimately aimed at transforming the body, the soul and the spirit through a process of perfection.\n\nHowever, the Neo-Platonists indeed believed that the soul returns to the One and to the blessedness of the paradise of souls through Theurgy. Similarly, the ancient Chaldeans considered that the return of the soul to the god En-Ki is signified by the repetition of the mythical time of Origins[83]. The main mystery for the Chaldeans and the Neo-Platonists was the immortalization or ascend.[84] The true purpose of the initiation was the rebirth of the soul through its journey in an invisible realm inhabited by spiritual beings. The neophyte, who achieved the ultimate initiation of the mystery, surpassed the world of necessity, which governs humanity; he rises to the first principle and gains immortality.[85]\n\nThe comparison of the Neo-Platonism with the Chaldean wisdom and practice does not necessarily imply the knowledge of the ancient Chaldean doctrines and ceremonies – a statement that cannot be proved true or false with certainty. Nevertheless, by suggesting the similarities between them, it becomes clear why the disciples and successors of Plotinus adopted the Chaldean Oracles. The main reason was to contrast as much as possible strongly and equally the Christianity and the mystery cults of the Late Antiquity. Thus, they forced to supplement the philosophy of the founder of Neo-Platonism with the practical dimension of spiritual experience. Nevertheless, the practical aspect of spirituality could not be followed, if Plotinus did not express his mystical experience in a context that required the integration of many ancient teachings. Among the latter, there are three main tenets: a) the division of hypostases, b) the extensive demonology – Plotinus wrote the treatise “On our allotted guardian spirit” (Περὶ τοῦ Εἰληχότος ἡμᾶς δαίμονος, III.4), identifying the demons’ dwelling space at the levels of Soul and matter – and c) the description of the motion of the human soul in a downward and upward path between the stars.\n\n\nThrough the highlighting of elements that connect the ancient Chaldeans with the Chaldean Oracles and the Neo-Platonism became clear that: a) this connection is neither necessary nor plausible, b) the reasons for which the Neo-Platonists traced their philosophy to the Chaldeans of Babylon was first, the prestige the latters had acquired in Classical and Hellenistic Antiquity, before their name to be identified with quackery and witchcraft during the early Middle Ages, and second – as a consequence of the first – the fact that the Eastern philosophy and religion were fashionable in Late Antiquity.\n\nHowever, a consequence of the above is the not altogether hypothetical conclusion that some nuggets of religion of the Eastern peoples contemporary to the Neo-Platonists, and perhaps of the ancient Chaldeans, preserved in the hexameter verses of the Chaldean Oracles. Some arguments supporting this conclusion are: a) the similarity of the ancient cosmology and the division of Being in the Chaldean Oracles with the ancient Chaldean cosmology, b) the relevance of the magical practices of the ancient Chaldeans with the Neo-Platonic Theurgy, c) the “fear of matter” in Chaldean Oracles, as a result of an ascetic morality and a devaluation of the material world, which are similar to the Neo-Platonic placement of matter in the lower level of the axiological and ontological climax.\n\nNevertheless, there is a particularly significant element in support of the position that the Eastern Chaldean wisdom influenced the Neo-Platonism. This is the non-accidental homonymy of the first principle of Neo-Platonism (En=One) with the word “En” of the ancient Chaldeans and Babylonians since in their cuneiform writing it means the Lord or the Priest, and it is used as the first part of many compound words for their gods, such as En-Lil (Lord of the Storm), En-Ki (deity of crafts, mischief, water, intelligence and creation) etc. The significance of this fact is accentuated by: a) the recognition by both sides of the indeterminacy of the first principle, which allowed the hope of ascending to the divine infinity, and the consequent possibility of the divine influence through the magical practices, and b) the existence of a “theological koine” of the Eastern Mediterranean peoples, which supported the syncretism of deities of different religions.\n\nMoreover, although the knowledge of the Chaldean Oracles by the founder of Neo-Platonism is a controversial issue due to lack of sufficient philological and historical evidence, there are some elements that could support it. First, Plotinus’ journey to Persia as a follower of the Emperor Gordian and the relation of his student Amelius to Apamea in Syria – where the cult of the god Baal was worshiped – suggest that he was not completely unaware of the ancient Chaldean teachings. Second, though Plotinus did not participated often in religious ceremonies, he expressed his personal experience through the language of the mystery cults of his time. Moreover, Plotinus described the union of the initiate with the divine as an ascent to heaven through a bright cosmic ship, which corresponds to the astral ascent of the ancient Chaldeans and the Chaldean Oracles. According to the latter the goddess Hecate – equivalent to the Neo-Platonic hypostasis of Soul – mediates so as the ascent through a vehicle to be accomplished. Third, the light symbolism in the Enneads is particularly significant since it is used as an illustration of the Good or the One. Similarly, the light symbolism is frequently mentioned in the Chaldean Oracles. According to the latter the light through the Creator God moved into the sun, illuminating the Earth’s surface and guiding the divine path of the mystic. Also, the Chaldean magician used the fire as a symbol of the divine light in the ceremonies. Fourth, in the thought of Plotinus and in that of his followers, there is an Underworld, where the souls are punished. Moreover, the Neo-Platonists accepted the existence of an intelligible place of the blessed gods.[86] In the same way, according to the Chaldean Oracles, the Earth contains an interior world of postmortem punishment of the souls. However, the principal mystery of the Chaldean Oracles is the immortalization of the soul on its return to the higher realms beyond the Earth. Also, according to the ancient Babylonian and Chaldean beliefs, there is an Underworld, understood as a dark place of death, without punishments and rewards. Nevertheless, the soul in this life has a way out during the recurrence of religious actions and thoughts: this is the revival of the mythical time of the Origins and the ascent to the god En-Ki.\n\n\nIf we were going to give an epilogue to the subject of this paper, it would be related to a general historical significance. In other words, it should be pointed out that the successors and the heirs of the founder of Neo-Platonism will accomplish the step he did not make, which is an obvious and close connection of philosophy with religion. The spread of the Neo-Platonic Theurgy caused by the Chaldean Oracles is a witness and a proof of this connection. The closure of the Platonic Academy of Athens in 529 AD by the Byzantine Emperor Justinian closed a cycle of life and thought as well. The latter began with the first appearance of the mathematics, the Chaldeans, at the third millennium BC, who by their religious perceptions influenced the Neo-Platonic movement, especially through the Chaldean Oracles. This cycle was symbolically and essentially completed by the emigration of the last Neo-Platonists philosophers, who with their leader Damascius flee to Haran of Mesopotamia.[87] Thus, the representatives of the Neo-Platonism will find themselves once again near the source of Chaldaism, and generally the Eastern wisdom, which inoculated into the last phase of Greek philosophy.\n\n[1] F. M. Fabes, “Arameans and Chaldeans: Environment and society,” in G. Leick (ed.), The Babylonian World (New York/London 2007) 290. The name Chaldeans (Kaldu) does not appear in sources before 878 BC.\n\n[2] P. A. Beaulieu, “Late Babylonian Intellectual Life,” in G. Leick (ed.), The Babylonian World (New York/London 2007) 482 and 475.\n\n[3] M. Rutten, La science des Chaldéens (Paris 1970) 6.\n\n[4] Ibid., 7.\n\n[5] This dating generally refers to the people who appeared in Mesopotamia in this period, in relation to the subsequent perception of the term “Chaldeans”, and should not be confused with the dating given by historians, around the 9th century BC, exclusively for a people with this name.\n\n[6] M. Rutten, La science des Chaldéens, op. cit., 13-15.\n\n[7] Diodorus Sicilus, Bibliotheca Historica, Α’, 28, 1. Cf. A. Uzdavinys, “Chaldean Divination and the Ascent to Heaven,” in P. Curry-A. Voss (eds), Seeing with Different Eyes: Essays in Astrology and Divination (Newcastle 2007) 21.\n\n[8] Algis Uzdavinys, “Chaldean Divination and the Ascent to Heaven,” op. cit., 32.\n\n[9] Ammonius of Alexandria, Fragmenta in Denielem, P.G. 85, 1376A. Cf. Α. Βακαλούδη, Η μαγεία ως κοινωνικό φαινόμενο στο πρώιμο Βυζάντιο (4ος -7ος αι. μ. Χ.) (Αθήνα 2001) 55 note 75.\n\n[10] Cf. A. Uzdavinys, “Chaldean Divination and the Ascent to Heaven,” op. cit., 21 and 32, note 4.\n\n[11] Α. Βακαλούδη, Η μαγεία ως κοινωνικό φαινόμενο, op. cit., 46.\n\n[12] Α. Βακαλούδη, Η μαγεία ως κοινωνικό φαινόμενο, op. cit., 46, note 7.\n\n[13] C. F. Mariottini, “Ur and Haran: Abraham’s Background,” Biblical Illustrator 27/1 (Fall 1997) 50-53.\n\n[14] Α. Βακαλούδη, Η μαγεία ως κοινωνικό φαινόμενο, op. cit., 55.\n\n[15] John Chrysostom, Homilies on First Corinthians, Homily ΜΔ’, P.G. 61, 413. Cf. Α. Βακαλούδη, Η μαγεία ως κοινωνικό φαινόμενο, op. cit., 55-56 and note 76.\n\n[16] Β. Τατάκης, Η Βυζαντινή Φιλοσοφία (Αθήνα 1997) 166.\n\n[17] M. Rutten, La science des Chaldéens, op. cit., 5.\n\n[18] J. Dillon, The Middle Platonists. 80 B.C. to A.D. 220 (Ithaca/New York 1996) 361.\n\n[19] É. d. Places, Numénius, Fragments (Paris 1973) fr. ΙΙ. Cf. Ἱάμβλιχος, Περὶ τῶν Αἰγυπτίων μυστηρίων (Θεσσαλονίκη 2005) 519, note 9.\n\n[20] Πορφύριου, Περὶ τοῦ Πλωτίνου Βίου καὶ τῆς τάξεως τῶν βιβλίων αὐτοῦ (Ἁθήναι 1991) 3.31.\n\n[21] Antoninos and not Antonius as Hans Lewy erroneously writes in Chaldean Oracles and Theurgy. Mysticism, Magic and Platonism in Late Roman Empire (Paris 2011) 395-4 and note 301. Cf. Πρόκλου, Εἰς τὸν Τίμαιον Πλάτωνος ΙΙ.154.9: Ernst Diehl (ed.), In Platonis Timeum Commentaria (Leipzig 1903, Amsterdam 1965).\n\n[22]R. Wallis, Neoplatonism (London 1972) 105-6.\n\n[23]A. Sheppard, “Proclus’ Attitude to Theurgy,” The Classical Quarterly 32/1 (1982) 212. This position is strengthened from the passage of Damascus, in his commentary Εις Φαίδωνα, Leendert Gerrit Westernik (ed.), The Greek Commentaries on Plato’s Phaedo: Damascius (Amsterdam 1977) 172: «οἱ μὲν τὴν φιλοσοφίαν προτιμῶσιν, ὡς Πορφύριος καὶ Πλωτίνος καὶ ἄλλοι πολλοὶ φιλόσοφοι∙ οἱ δὲ τὴν ἱερατικὴν, ὡς Ἱάμβλιχος καὶ Συριανὸς καὶ Πρόκλος καὶ οἱ ἱερατικοὶ πάντες».\n\n[24] Iamblichus, De Mysteriis (Atlanta 2003) I.2 (p. 8).\n\n[25] R. Wallis, Neoplatonism, op. cit., 106.\n\n[26] B. Tambrun-Krasker (Éd.-intr.-trad.-comm.), Μαγικὰ λόγια τῶν ἀπὸ Ζωροάστρου μάγων. Γεωργίου Γεμιστοῦ Πλήθωνος. Ἐξήγησις εἰς τὰ αὐτὰ λόγια. Oracles Chaldaïques. Recension de Georges Gémiste Pléthon, La recension arabe des Μαγικὰ Λόγια par Michel Tardieu. Corpus Philosophorum Medii Aevi. Βυζαντινοί Φιλόσοφοι – Philosophi Byzantini (Ἁθήναι/Paris/Bruxelles 1995) 44.\n\n[27] Dylan Burns, “The Chaldean Oracles of Zoroaster, Hekate’s Couch, and Platonic Orientalism in Psellos and Plethon,” in Aries 6:2 (2006) 158-179, where the author presents convincing arguments for this position.\n\n[28] Henri Corbin, and other modern scholars, supported the view that Islamic mysticism influenced the work of Plethon through the Sufi Suhrawardi (see S. H. Nasr, Three Muslim Sages. Avicenna-Suhrawardi-Ibn ‘Arabi (Delmar/New York 1997) 62), when the Byzantine scholar lived in Bursa or Hadrianopolis (Edirne), and studied with the Jew Elissaios, according to the writings of Scholarios. See W. G. Hanegraff, “The Pagan who came from the East: George Gemistos Plethon and Platonic Orientalism,” in W. Hanegraff-J. Pinenburg (eds), Hermes in the Academy. Ten Years’ Study of Western Esotericism at the University of Amsterdam (Amesterdam 2009) 33-49. It was further suggested that perhaps the mystic teacher Elissaios is identified with Sheikh Bedreddin. See N Siniossoglou, “Sect and Utopia in shifting empires: Plethon, Elissaios, Bedreddin,” Byzantine and Modern Greek Studies 36/1 (2012) 38-55.\n\n[29] For this general point, see J. Godwin, The Golden Thread: The Ageless Wisdom of the Western Mystery Traditions (Wheaton, Illinois 2007) 8. The author refers the view of the eighteenth-century Platonist and translator Thomas Taylor, who believed that some of the Chaldean Oracles went back to the original Zoroaster.\n\n[30] Α. Uzdavinys, “Chaldean Divination,” op. cit., 21-2.\n\n[31] C. Zintzen, Die Philosophie des Neuplatonismus, Wissenschaftliche Buchgesellschaft (Darmstadt 1977) 391-426.\n\n[32] É. d. Places, Oracles Chaldaïques. Avec un choix de Commentaires Anciens (Paris 1971) 14.\n\n[33] Ibid., 14.\n\n[34] Ibid., 15.\n\n[35] Ibid., 16.\n\n[36] Ibid., 298.\n\n[37] H. Lewis, The Chaldean Oracles, op. cit., 390. He highlights: «the Chaldeans limit their “hylophobia” to the sublunar world, a point of decided difference from the Gnostics, who gave up the entire creation as a massa perditionis».\n\n[38] Enneads II.9.8.22. Cf. Πλωτίνου, Ἑννεάς Πρώτη (Ἁθήναι 1994) 125 (Enneads Ι.8.3.4-7).\n\n[39] W. R. Inge, The Philosophy of Plotinus 1 (New York 1968) 203.\n\n[40] R. Borger, Mesopotamisches Zeichenlexikon (Münster 2003) nr. 164. Ut 12097. Cf. F. Lenormant, Chaldean Magic its Origin and Development (2010) 15, where it is noted that the word: ên is an ideogram with a complex character formed of the sign “su”, which represents the idea of “gathering” and “cohibition”, and the sign “an”, god”. Lenormant concludes that the formation of this character proceeds from an dea analogous to that of the “gods’ necessities” («θεῶν ἀνάγκαι») of the Neo-platonic Theurgy. Cf. Ἱάμβλιχος, Περὶ τῶν Αἰγυπτίων μυστηρίων, op. cit., I.14\n\n[41]W. Moran, The Amarna Letters (Baltimore/London 1992) 239, 307, 323. Some examples of letters which use the cuneiform writing “EN” is EA (for “El Amarna”) 152, EA 254, EA and 282. Usually it is used in the introduction of the letter, when it is addressed to Pharaoh, and calls him “King, my Lord”. This address is called Bêlu or Veli as well (ibid., 144, note 7). Also, Baal is sometimes identified with the Adad (ibid., 386).\n\n[42] G. Contenau, La Magie chez les Assyriens et les Babyloniens (Paris 1947) 59-60.\n\n[43] A. George (transl.), Epic of Gilgamesh. The Babylonian Epic Poem and Other Texts in Akkadian and Sumerian (London 1999) 224.\n\n[44] S. A. Rappe (transl.), Damascius’ problems and solutions concerning first principles (Oxford 2010) 418 and note 99.\n\n[45] S. Dalley-A. T. Reyes, “Mesopotamian Contact and Influence in the Greek World,” in Stephanie Dalley (ed.), The Legacy of Mesopotamia (Oxford 1998) 85-124. Πρβλ. R. Klibansky-C. Labowsky, Plato Latinus 3 Parmenides usque ad finem primae hypothesis nec non Procli Commentarium in Parmenidem, pars ultima adhuc inedita inteprete Guillelmo de Moerbeka (London 1953) 274.\n\n[46] É. d. Places, Oracles Chaldaïques, fr. 5-6.\n\n[47] The Once beyond is identified with the Monad in the Chaldean Oracles. See R. Majercik, “Chaldean Triads in Neo-Platonic exegesis: some reconsiderations,” The Classical Quarterly 51/1 (2001) 274.\n\n[48] Macrobius, Saturnalia 1/1-2, R. A. Kaster (ed.) (Harvard 2011) 304. Cf. R. Klibansky-C. Labowky, Plato Latinus, op. cit., 95 and P. Talon, “Enūma Eliš and the Transmission of Babylonian Cosmology to the West,” R. M. Whiting (ed.), Melammu Symposia 2. Mythology and Mythologies. Methodological Approaches to Intercultural Influences. Proceedings of the Second Annual Symposium of the Assyrian and Babylonian Intellectual Heritage Project (Paris 1999) 274-5.\n\n[49] W. C. Lambert-S. B. Parker, Enûma Eliš. The Babylonian Epic of Creation (Oxford 1966) 101-102.\n\n[50] S. Parpola, “The Assyrian Tree of Life: Tracing the Origins of Jewish Monotheism and Greek Philosophy,” Journal of Near Eastern Studies 52/3 (July 1993) 206.\n\n[51] P. Athanassiadi, “The Chaldean Oracles: Theology and Theurgy,” in P. Athanassiadi – M. Frede (ed.), Pagan Monotheism in Late Antiquity (Oxford 1999) 155.\n\n[52] Ibid., 156.\n\n[53] S A. Rappe (transl.), Damascius’ problems and solutions concerning first principles, 315.\n\n[54] P. Talon, “Enūma Eliš and the Transmission of Babylonian Cosmology to the West,” op. cit., 275.\n\n[55] G. Contenau, La Magie chez les Assyriens et les Babyloniens, op. cit., 135-137.\n\n[56] A. Uždavinys, Philosophy as a Rite of Rebirth. From Ancient Egypt to Neo-Platonism (Wiltshire 2008) 204 and 316. Cf. J. Assmann, The Mind of Egypt. History and Meaning in the Time of the Pharaohs (Cambridge/Massachusetts and London 2002) 57 and 71.\n\n[57] P. Athanasiadi, “The Chaldean Oracles: Theology and Theurgy,” op. cit., 177-182.\n\n[58] Enneads V.3.13.1-7\n\n[59] Πορφύριος, Περὶ τοῦ Πλωτίνου Βίου, op. cit., 3.15-22.\n\n[60] Ibid., 3.25-38 and 4.10-16.\n\n[61] The only reference that Plotinus was aware of the Chaldean Oracles is found in the work of Michael Psellos (Patrologia Graeca 122, 1125d1-2. Cf. É. d. Places, Oracles Chaldaïques, op. cit., 165), and regards the beginning of the rudimentary treatise of the Enneads I.9: «μὴ ἐξάξεις, ἳνα μὴ ἐξίῃ ἔχουσα τι» (you shall not take out your soul, so that it not goes having something). The following text is very contradictory and it is difficult to be reconstructed. E. R. Dodds (The Greeks and the Irrational (Berkley/Los Angeles/London 1951) 301, note 26) concluded that it could not have come from hexameter verse. However, most likely is that Plotinus actually had in mind the Chaldean verses, and Psellos’ information is correct (See Πλωτίνου, Ἑννεάς Πρώτη, op. cit., 317-8. Cf. especially the argumentation by J. F. Finamore, Iamblichus and the Theory of the Vehicle of the Soul (Chico/California 1985) 8 and note 10).\n\n[62] Πορφύριος, Περὶ τοῦ Πλωτίνου Βίου, op. cit., 19.20-32.\n\n[63] P. Athanasiadi, “The Chaldean Oracles: Theology and Theurgy,” op. cit., 156.\n\n[64] With the exception of the invocation in the Iseum according to the testimony of Porphyry (Περὶ τοῦ Πλωτίνου Βίου, op. cit., 10). When Amelios invited Plotinus to the festival of the new moon, the latter refused, giving his famous answer: «the gods ought to come to me, not I to go to them».\n\n[65] Enneads VI.9.11.18-25.\n\n[66] Ibid., VI.9.11.28-33. Actually, Zeke Mazur presented Plotinus’ mysticism as an inner magic and Theurgy. See “Unio Magica, Part 1: On the Magical Origins of Plotinus’ Mysticism,” Dionysius 21 (2003) 23-52 and “Unio Magica, Part 2: Plotinus, Theurgy, and the Question of Ritual,” Dionysius 22 (2004) 29-56.\n\n[67] “Gods Emperors” («Θεοὺς αὐτοκράτορας»), as Philo of Alexandria called them (see De specialibus legibusΠερὶ τῶν ἐν μέρει διαταγμάτων Ι.13).\n\n[68] Πλωτίνου, Ἑννεάς Δευτέρα (Αθήνα 1997) 223.\n\n[69] Plato in the myth of the Republic likened the cosmic boat to the hypozōmata (undergirding) of triremes. See Plato, Republic, 616c 3. It is an image similar to that of God as ruler of the universe. See Numenius, Fragments, É. d. Places (ed.), (Paris 1973) fr. 18 (p. 58).\n\n[70] Evolution of the vehicle of the Platonic Timaeus (41e1-2).\n\n[71] Perhaps we can trace here an impact of the Egyptian doctrine of the “boat of the soul”. See Πλωτίνου, Ἐννεάς Τρίτη (Ἁθήναι 2004) 404.\n\n[72] See Proclus Commentary on Plato’s Timaeus I/1: Proclus on the Socratic State of Atlantis (Cambridge 2006) 96, 98, 207, 209, 235, 240 – Proclus Commentary on Plato’s Timaeus II/2: Proclus on the Causes of the Cosmos and its Creation (Cambridge 2008) 155 – Proclus Commentary on Plato’s Timaeus III/3 Proclus on the World’s Body (Cambridge 2007) 23, 45, 59, 114, 129, 141, and 145.\n\n[73] The interpretation of the passage IV.3.24 of the Enneads by Ιoan Couliano is not correct (Expériences de l’extase: Extase, ascension et récit visionnaire de l’hellénisme au Moyen Age (Paris 1984), since Plotinus does not claim that the soul in its ascent does not need the astral body, but that by its nature it is destined to divest itself of corporeality.\n\n[74] By this division Porphyry was placed between Plotinus’ view that the upper part of the soul does not descend into the bodies, and Proclus’ view that the whole soul descends into the earthly world. His thought will eventually influence the work of Iamblichus, who considered the soul-vehicle as a median between the rational soul and the body. See M. Zambon, “Le significato filosofico della doctrina dell’ochêma dell’anima,” in R. Chiaradonna (ed.), Studi sull’anima in Plotino (Naples 2005) 305-337.\n\n[75] J. F. Finamore, Iamblichus and the Theory of the Vehicle, op. cit., 39.\n\n[76] Enneads VI.8.7.1-2. For Plotinus the higher self of man remains unaffected from the influences of both the world of becoming and of any attempt to be damaged due to magical practices. Even the influence of the stars does not affect the superior soul of man, which always remains high near the Intelligence and does not fall down here. This means that man is prepared to rise through the hypostases to the beginning of all beings, the One. Conversely, according to Proclus, it is the whole soul which falls into the world of bodies. See Proclus, The Elements of Theology (Oxford 1963) 309. This is not because of Proclus’ pessimism, but because the soul has to use all of its powers to rise again through the stellar road to the intelligible kingdom. Thus, a larger responsibility and freedom is attributed to man in relation to the earlier Neo-Platonism of Plotinus. Cf. T. Whittaker, The Neo-Platonists. A Study in the history of Hellenism (New York 1970) 180.\n\n[77] G. Contenau, La Magie chez les Assyriens et le Babyloniens, op. cit., 127.\n\n[78] Ibid., 154. Cf. M. Eliade, Cosmologie et Alchemie Babyloniennes (Paris 1991) 24-29.\n\n[79] M. Eliade, A History of Religious Ideas. From the Stone Age to the Eleusinian Mysteries 1 (London 1979) 61-2. Cf. G. Shaw, Theurgy and the Soul. The Neo-Platonism of Iamblichus (Pennsylvania 1995) 28 sq.\n\n[80] F. Cumont, Astrology and Religion among the Greeks and Romans (New York/ London 1912) 32, 40.\n\n[81] Η. Lewis, Chaldean Oracles, op. cit., 409-410.\n\n[82] R. D. Majercik, Chaldean Oracles: text, translation and commentary (Leiden 1989) 215.\n\n[83] M. Eliade, A History of Religious Ideas, op. cit., 58.\n\n[84] This mystery is not adequately described. See Eric Robertson Dodds, “New Light on the Chaldean Oracles,” in H. Lewis, Chaldean Oracles, op. cit., 698.\n\n[85] Ibid., 213.\n\n[86] Enneads Ι.8.2.26, VI.7.35.38, III.5.9.39.\n\n[87] P. Chuvin, Chronique des derniers païens (Paris 1990) 144.\n\nPhilosophia 14/2016, pp. 171-189", "pred_label": "__label__1", "pred_score_pos": 0.8542715311050415} {"content": "For many of us, the holiday season is a time of joy, family time, and closeness. However, for millions of people worldwide, this holiday season will be much different from any before.\n\nWith social distancing, travel bans, and lockdown becoming commonplace worldwide, many people won’t be able to travel home, see their families, and spend time with loved ones this year.\n\nSo, it is normal if you feel anxious about holidays and feelings of loneliness, isolation, sadness that may come along. Before this new, pandemic-normal, most of our holiday stress used to spin around holiday schedules, last-minute errands, gift shopping, entertaining, and spending time with our families. The things we once used to dread turned out to be something we long for this year.\n\nThe holiday season can be particularly challenging if you have recently lost a loved one and you’re still grieving. Holidays only increases the feeling of loss, and the sorrow and loneliness feel more profound. So, it is expected that you feel blue about the upcoming holiday season. But you will get through it. Here are a few strategies to boost your spirit and deal with loneliness during the holiday season.\n\n\n1. Make Self-Care Your Priority\n\nTaking a break from endless shopping, partying, and entertaining friends and family doesn’t have to be depressing. Use this time to relax and do things you enjoy.\n\nStart your days with a mindfulness exercise. Both science and practice have proven the benefits of meditation and relaxation. Techniques such as mindfulness, deep breathing, guided imagery, or yoga can help you relax, feel calm, and deal with stress, anxiety, and loneliness.\n\nMindfulness meditation can help you become aware of your negative thoughts that trigger profound loneliness and isolation. The practice of being present in the moment can help you acknowledge such thoughts and then calmly let them go.\n\nBesides, mindfulness practice has the power to boost your optimism and raise resilience by reducing the activity in the amygdala, part of the brain responsible for stress responses. So, reducing the amygdala’s activity, mindfulness decreases the levels of stress and anxiety.\n\nStick to healthy sleep habits. Restful sleep can strengthen your immune system, reduce anxiety and depression, and boost your resilience.\n\nExercise regularly. Physical activity stimulates the production of the powerful neurotransmitters (dopamine, serotonin, norepinephrine, and endorphins), also known as natural pain relievers or ‘hormones of happiness.’ These neurotransmitters generate new cells and connections in our brain, similarly to what antidepressant medicament therapy does.\n\nEat healthily. Studies show that a Mediterranean-style diet that involves fish, vegetables, fruits, whole grains, and olive oil promotes physical and mental well-being.\n\nConnect with nature. If you are not strictly ordered to stay at home, spend time outdoors whenever you can, respecting social distancing rules. Even if it is spending time on your balcony, connecting with nature can help you relax and reduce anxiety and loneliness.\n\n2. Stay Connected with Friends and Family\n\nThis holiday season, many of us will virtually invite family members and friends into our homes. Social distancing doesn’t mean we should avoid social interaction altogether. To reduce feelings of loneliness and isolation during holidays, use technology and apps to stay in touch with loved ones. Socializing, even in digital space, will improve your mood and help protect your mental health.\n\n3. Seek Support\n\nIf you feel that loneliness during the holiday season is too much to bear on your own, seek out mental health counseling. To respect social distancing rules, you may want to consider online counseling options.\n\nE-counseling is within reach from your computer or smartphone at any given time but no less effective than traditional in-office counseling. Psychotherapy and counseling can help you work through feelings of sadness, isolation, fear, or anxiety, teach you strategies for coping with stress, and help you overcome the crisis.\n\n4. Join Online Communities\n\nIf you feel lonely and isolated during the holiday season, reach out to websites or chatrooms where you can socialize with people who share your interests or experiences. Join some online chat rooms (communities gathered around a specific topic) and speak to people in the community.\n\nThis holiday season might feel a bit lonelier and gloomy, but life doesn’t stop here. Hopefully, things will start getting back close to what we remember as normal in all life areas. Loneliness during the holiday season might make us more conscious of how delicate life is, motivating us to feel more grateful for simple life pleasures and people in our lives.\n\nDon’t forget that we are all in this together, so none of us is truly alone. Wishing you a safe and peaceful Holiday season!\n\nShare This Post", "pred_label": "__label__1", "pred_score_pos": 0.9881457686424255} {"content": "In Cleburne, Texas there are several problems that can rear their heads, derailing the process of drafting or executing a will. Frequent examples include ambiguities in the language of the will, leading to conflicts and challenges. Most of these issues can be staved off through quality drafting.\n\n\nBut even if the will is relatively simple, some preventable problems can derail the process. An accomplished lawyer in Cleburne, Texas who specializes in wills and estate planning can help make sure that this doesn't happen to your will.\n\n\nHolographic Wills in Cleburne, Texas\n\nIf you need to make a will quickly, some states authorize you to write a \"holographic will.\" This is simply a will which the testator hand-writes. These types of wills don't need to be witnessed.\n\nA holographic will, where they are authorized, will typically be interpreted liberally, to give effect to the testator's intent if at all possible.\n\n\nIf your estate is relatively small, and the devises you wish to make aren't very difficult, a holographic will can be a good option if they're valid in your state. Of course, it's never a bad idea to make a will with the assistance of a lawyer.\n\nHow Can A Cleburne, Texas Lawyer Help?\n\nBecause there are particular formalities which must be followed in drafting wills, it's always a good idea to seek the help of a Cleburne, Texas attorney in drafting your will. Even if your will is going to be very simple, and you have the formalities all figured out, mistakes can be made.", "pred_label": "__label__1", "pred_score_pos": 0.5692866444587708} {"content": "What is a Comprehensive Master Plan?\nOur community is thriving. As more residents and business owners discover Castle Rock as a desirable place to raise a family or grow a business, it’s important to have a guiding plan. A plan helps ensure the Castle Rock we know today, remains the Town we still love in the future.\n\nA Comprehensive Master Plan defines the Town’s broad and long-term direction. Then, it defines specific goals and objectives to help guide the Town’s decisions around growth and development.\n\nShow All Answers\n\n1. What is a Comprehensive Master Plan?\n2. What’s included in the plan?\n3. How does the plan guide development decisions and control growth?\n4. What other ways does the plan guide the Town?\n5. How often is plan updated?", "pred_label": "__label__1", "pred_score_pos": 0.5414912700653076} {"content": "Updates And Results For Who's Number One: Gordon Ryan vs Matheus Diniz\n\nWNO main card\n\n\nGet Started\n\nAlready a subscriber? Log In\n\nLive from Who's Number One: Gordon Ryan vs Matheus Diniz, here is the play by play of every single match!\n\nWilliam Tacket vs Jason Rau\n\nRau pulled to butterfly half guard right away. Tackett looked for an over under pass and Rau began to threaten the legs.\n\nTackett changed sides to knee cut to the right, and got stopped by Rau’s reverse De La Riva guar.\n\nTackett remained heavy in his passing attempts but Rau was able to scoop a leg up and earn top position off of Tackett’s defense. \n\nTackett came up on a single leg to reestablish top position.\n\nTackett stepped over to pass and ended up with a mounted triangle. He followed through and ended up on bottom, where he secured the triangle and finished with a Kimura.\n\nWilliam Tackett def Jason Rau via Kimura\n\nNicky Ryan vs Tony Ramos\n\nNicky didn't hesitate to sit to butterfly guard and then enter into a single leg X-guard. He switched to outside ashi gurami and immediately applied a heel hook for the quick submission win.\n\nNicky Ryan def Tony Ramos via heel hook\n\nNathalie Ribeiro vs Luiza Monteiro\n\nNathalie sat directly to guard. Amid a pass, Luiza attempted an armbar and ended up on bottom with Nathalie coming up. \n\nNathalie looked patient from the top trying to find an angle through Luiza’s guard and clearing hooks away from her legs.\n\nLuiza sat up to a front headlock and used Nathalie’s defense to stand up. Luiza sat back to guard, and as Nathalie went to pass, Luiza started to attack her leg. Nathalie countered with her own toe hold, and was able to clear out of the position.\n\nAfter a moment, Nathalie sat back to guard. Luiza entered a knee cut position which appeared heavy, but Nathalie kept a strong reverse De La Riva. Luiza sat back to attack a foot, and Nathalie exploded up, nearly taking Luiza’s back and then nearly mounting.\n\nAs Luiza recovered, she snagged Nathalie’s leg, but Nathalie found room to escape her knee free.\n\nLuiza attempted another attack on the leg, but the match went out of bounds and was reset standing.\n\nLuiza pulled guard after a brief standing exchange. Nathalie established a headquarters passing position, but struggled to get free of Luiza’s grips and frames.\n\nLuiza found a backdoor entry to establish 50-50 guard.\n\nThey struggled in the position before Nathale got the better of the position and chased a foot lock out of bounds.\n\nThey reset in the middle again with three minutes left and Luiza sat to guard, attacking a leg again, but finding even less purchase on Nathalie’s knee. Nathalie counted with a sort of Estima lock before they stood up again. \n\nWith a minute left, Nathalie shot in and Luiza attacked the leg again, but again Nathalie kept her knee outside the position and countered with an Estima lock. She turned it into an Aoki lock, and Luiza fell back for a heel hook before time expired.\n\nTwo of three judges voted in favor of Nathalie Ribeiro.\n\nNathalie Ribeiro def Luiza Monteiro via split decision\n\nPaulo Miyao vs Geo Martinez\n\nPaulo sat to guard. Geo entered with his hips back, attempting to pass with a leg pin before stepping deeper into the guard.\n\nMiyao went to K-guard, and tried to force a crab ride; but Geo defended his back well and disengaged.\n\nGeo came back to the top, and sat back in an attempt to enter a leg entanglement, but found none and retired to passing.\n\nPaulo isolated a leg then stood up, rushing Geo to create a passing angle. Geo remained strong in his seated position for some time, but Paulo was eventually able to create enough pressure and enter a deeper passing position. In the exchange, Geo grabbed a headlock, forcing Paulo to escape. They returned to their feet, then Paulo opted to sit to guard.\n\nGeo tried to pass from distance, then sat back on a straight ankle lock. Both competitors attempted a berimbolo style roll to crab ride, but neither was successful.\n\nPaulo got on top into a knee cut position, cooking Geo there. Geo eventually got free and earned a sweep before sitting back into a leg lock position, where he controlled both ankles with over wraps.\n\nGeo released his grips and came to the top with four minutes remaining. Paulo looked to turn on the pace from the bottom with back and leg entries, then came to the top, storming Geo with pace. Geo tried another leg entanglement, Paulo answered with a rolling back take attempt before the match ventured out of bounds.\n\nWith two minutes left, Geo took top position, entered a leg lock, and defended Paulo’s back take counter.\n\nIn his best passing attempt of the night, Geo found a short razor armlock, which Paulo defended. In a last ditch effort, Paulo tried a snap down, and Geo counted with a leg attack as time expired.\n\nGeo Martinez def Paulo Miyao via split decision\n\nDante Leon vs Kody Steele\n\nAfter a minute of feints and hand fighting, Dante took the first successful shot, a double leg which put Kody on his back. He tried to hold position in half guard before settling back to a headquarters position with a tall posture.\n\nDante found an angle to advance passed the guard and secured a guillotine grip. Kody defended it and established top position, but Dante was able to sit up on a single leg, setting Kody down.\n\nFrom headquarters position, Dante had success setting up his passes, but not finishing them against Kody. Still, Dante appeared to dictate the pace.\n\nDante switched to a double-under pass, then a body lock before the action went out of bounds.\n\nKody removed his shirt, and the wardrobe change correlated with a change in Kody’s approach. He played a more seated game. But Dante kept the pressure on. He dove for a guillotine again,  then switched to a Darce; but Kody was able to sneak out.\n\nHere, Dante started to capitalize on his momentum and secured his first complete pass of the fight.\n\nThe match scrambled out of bounds and Dante pulled guard on the return. Kody tried to backflip past Dante’s guard, but the move put him underneath Dante, who turned the pressure on again.\n\nOn another reset, Dante sat to guard again and wrestled back to the top. From there he secured another headlock, where he dropped his weight for a moment before Kody escaped.\n\nWith just more than a minute left, Dante snatched a fourth guillotine attempt, his deepest, and sold out on it. Kody found his way out, but seemed exhausted beneath Dante’s pressure, which persisted until the final second of the match.\n\nDante Leon def Kody Steele via unanimous decision\n\nElisabeth Clay vs Gabi Garcia\n\nLis sat to guard and pulled Garcia in, setting up a gogoplata. Gabi got out of the first attack, but Lis secured her guard again, high around Gabi’s shoulders. Gabi drove her pressure forward atop Lis. Clay’s coach, Samir Chantre alluded that they expected Gabi to make a specific mistake.\n\nGabi sprawled with a body lock pass within the closed guard, and Clay looked for a guillotine momentarily before climbing her guard up again.\n\nGabi separated the guard and got to half guard, clearly putting an immense amount of pressure on Lis, who eventually turtled and returned to her closed guard.\n\nGabi sprawled back, looking for a Sao Paulo pass once more and getting to Clay’s half guard again.\n\nClay created space and locked an initial Kimura grip. Gabi tried to jump over rush through Clay’s final line of defense, but Lis recomposed her guard.\n\nWith Gabi’s pressure forward, Lis threatened a triangle, then settled in butterfly guard with eight minutes remaining. Taking advantage of her larger wingspan, Gabi locked around Lis’s hips again, flipping Lis over and nearly finishing the pass before Lis composed half guard, and eventually closed guard.\n\nWith five minutes left, Gabi stood to pass for a moment, to the excitement of Clay’s corner. But Gabi settled back before sprawling back to pass.\n\nDefending the pass, Lis turned to her knees and survived Gabi’s attacks before recomposing half guard.\n\nGabi tried to smash past the guard, and Lis collected the leg for an attack but could not secure it, and Gabi dropped her weight, pinning Lis’s toes to the mat to collect herself.\n\nLis returned to closed guard once again, hunting for a gogoplata attack. Gabi worked toward another Sao Paulo pass, and Lis found an omoplata. She had a severe angle on the arm, but with little time remaining, Garcia was able to survive.\n\nAll three judges awarded the win to Garcia.\n\nGabi Garcia def Elisabeth Clay via unanimous decision\n\nCraig Jones vs Roberto Jimenez\n\nCraig sat to guard and forced Z-guard, then dove to attack the far leg. Roberto countered with a rolling back take, escaping toward the edge of the mat. Craig returned to Z guard before Roberto created distance.\n\nCrag used an arm drag to set up another leg entanglement. Roberto was able to escape the first iteration, but Craig secured a deeper position in the scramble. He settled in the inside sankaku, finishing the heel hook for the victory.\n\nCraig Jones def Roberto Jimenez via heel hook\n\nMain Event: Gordon Ryan vs Matheus Diniz\n\nGordon sat to guard. Matheus kept his hips far away, but exploded in for a body lock pass. Not finding the angle, he returned to distance, then back into a body lock position.\n\nGordon attempted a butterfly sweep, but Matheus kept his hips square. He kept physical, jumping on and over Gordon’s guard. \n\nMatheus turned away momentarily, and Gordon followed him up, scoring on a double leg takedown. He progressed from a smash pass into deep half, then attacked a Kimura, looking for a back take but returning back underneath Matheus.\n\nMatheus continued sudden, explosive movements, but Gordon kept his frames, eventually earning an under hook, but Matheus distanced himself when Gordon climbed to create a meaningful grip.\n\nGordon sat up with a collar tie and snapped Matheus down, securing a cradle to put Matheus on his back and then settling in a side smash.\n\nAs Matheus exploded to escape, Gordon slid into mount and rode through the instant bucking escape attempts.\n\nGordon stabilized patiently as Matheus alternated between waiting and popping his hips. As Matheus’s movement became less and less frequent, Gordon started to push Matheus’s arm across toward an arm triangle position.\n\nMatheus's most significant escape attempt came after a reset. But as Matheus came close to escaping, Gordon almost took his back before settling back in mount.\n\nGordon got more aggressive in attacking for the arm triangle, but that allowed Matheus to get out, coming on top after six minutes beneath Gordon.\n\nAfter a stalemate in butterfly guard, Matheus made an aggressive attempt to pass. Gordon collected his legs and held a heel hook position. He and Matheus stopped moving, understanding that the match was over. Matheus eventually conceded.\n\nGordon Ryan def Matheus Diniz via heel hook\n\nGrappling Bulletin: You Shouldn't Be Mad About The IBJJF Heel Hook Rules\n\nibjjf heel hooks.jpg\n\nHello grappling fans, welcome to 2021. We can’t forget 2020 but we can move on as quickly as possible. I’m sure you feel the same in hoping that 2021 will be an easier ride and things return to some semblance of normal. \n\n\nGet Started\n\nAlready a subscriber? Log In\n\nTackett, Marinho, Jonnatas Victorious at Fight to Win 160\n\ntackett vs combs f2w 160.jpg\n\nWilliam Tackett beat John Combs in the main event of Fight to Win 160 tonight. In a no-gi match that went the distance, Tackett won via split decision.\n\nDates, Locations Announced For ADCC Trials In 2021\n\nADCC trials 2021.jpg\n\nIf you want to compete at the 2022 ADCC World Championships then you need to know the dates for the ADCC Trials scheduled for 2021. Invites are extremely limited and highly exclusive, meaning it is nearly essential to enter a qualifying event to guarantee your place at the biennial ADCC World Championships. \n\nThe New IBJJF Rules For Heel Hooks And Leg Reaping in 2021\n\nibjjf heel hooks.jpg\n\nThe IBJJF has released its updated rules for 2021, which include rules legalizing the application of heel hooks and leg reaping techniques for some competitors.\n\nFloSports Announces Partnership with Dollamur Sport Surfaces\n\nFloSports_Dollamur Article Header.png\n\nAUSTIN, TX  - January 12, 2021 - FloSports, the innovator in live sports streaming and original content, announced it has entered into a multi-year partnership with Dollamur Sport Surfaces to become the Official Mat of FloSports.\n\nCan Tackett Avenge His Last Submission Loss vs John Combs?\n\nCombs Tackett F2W 160.jpg\n\nJohn Combs is one of very few black marks on William Tackett’s professional grappling record. Combs is the only person who has submitted Tackett in regulation since at least 2019.\n\n\nGet Started\n\nAlready a subscriber? Log In\n\nFloGrappling Awards: Results For Best Match, Submission, Grapplers Of 2020\n\n\n2020 has come to a close, and the fans have voted for the best moments and athletes of the year. There are hundreds of competitors and thousands of grappling matches every year across an array of formats. Even to be nominated is a major achievement. \n\nGordon & Nicky Ryan, Tye Ruotolo Set Who's Number One Records In 2020\n\ngordon armbar kyle boehm WNO.jpg\n\nIn 2020, FloGrappling launched Who’s Number One, a series of superfights featuring the many of the best grapplers in the world. With the inaugural year of WNO now in the books, here are some of the athletes, trends, and noteworthy statistics from the mega event series in 2020.\n\n\nGet Started\n\nAlready a subscriber? Log In\n\n2020 FloGrappling Awards: Vote For The Best Athletes, Submission, Match\n\n\n2020 has come to a close, which means it’s time to vote for the best moments and athletes of the year. The fifth annual FloGrappling Awards is open for voting from Jan. 1 through Jan. 8. There are hundreds of competitors and thousands of grappling matches every year across an array of formats. Even to be nominated is a major achievement. \n\nVote NOW for the 2020 Male Grappler of the Year | FloGrappling Awards\n\nAwards-Best Male Grappler.jpg\n\nTo state the obvious, 2020 was an unusual year for competitive jiu-jitsu. Still, several competitors found ways to set themselves apart, and to impress us in ways few other athletes can.", "pred_label": "__label__1", "pred_score_pos": 0.7172847986221313} {"content": "Read our news\n\nlinear regression quotes\n\nNo comments\n\nIt starts to get these patterns built into it somehow. I'm a creature of adaptation. . S = k + mT + nP . Fit a multivariate regression model to panel data using least squares, assuming different intercepts and slopes. Alice Miller It is possible to resolve childhood repression safely and without confusion - something that has always been disputed by the most respected schools of thought. Linear Regression is a way of simplifying a group of data into a single equation. Instructional Ideas . I thin many people's deviant behavior starts with dreams because dreams are so non-linear... as if there's an assumption that everything has to be linear or has to be plotted. Linear Regression Introduction. I think there will be 20 years of evolution from linear broadcast to internet television. Variablen, die die Funktion mathematisch definieren, werden oft als griechische Buchstaben darsgestellt. Technology is our friend today, but will be our enemy in the future.”, “Our evolution depends on our memory. Like how Cassie Kozyrkov quotes it: Neural networks may as well be called “yoga networks” — their special power is giving you a very flexible boundary. Here we can model the relationship between temperature, price, and sales in one single equation. Are you asking because of recent events? My nature is to be linear, and when I'm not, I feel really proud of myself. [...] Do you know why I called my first book Tropic of Cancer? God! Linear regression is a basic and commonly used type of predictive analysis. “Life is ten percent what you experience and ninety percent how you respond to it.”, “He acts like an animal, has an animal's habits! I was not out to paint beautiful pictures; even painting good pictures was not important to me. Our goal is to help you by delivering amazing quotes to bring inspiration, personal growth, love and happiness to your everyday life. You show me one step forward in the name of religion, and I'll show you a hundred retrogressions…I'm for decency—period. . Eine hilfreiche Einführung wird auch von der Pennsylvania State University angeboten. 2. How To Become Great Through Time Conversion: Are you wasting time, spending time or investing time. Multiple regression is just an extenssion of linear regression we saw earlier. Welcome back. Juni 2018 um 16:12. Alice Miller. Fit a linear regression model that contains a categorical predictor. Yet it should be very obvious that someone who was allowed to feel free and strong from childhood does not have the need to humiliate another person. Linear regression is one of the most common data analysis techniques to help you make sense of Big Data and enable more informed decision-making. If we keep forgetting the mistakes of the past, only to keep repeating them, then we will never change. These extra lines are formed by calculating 1 or 2 standard deviations of linear regression line. And in that time frame, humans will have lost their voice, their power, all freedoms, and all worth. Linear thinking typifies a highly developed industry. Load the sample data. As explained above, linear regression is useful for finding out a linear relationship between the target and one or more predictors. Es gibt aber noch eine Sache, die mir nicht so ganz klar ist. The indicator has two parameters. 2. Liberal soccer moms are precisely as likely to receive anthrax in the mail as to develop a capacity for linear thinking. 3. The overall idea of regression is to examine two things: (1) does a set of predictor variables do a good job in predicting an outcome (dependent) variable? This mathematical equation can be generalized as follows: Y = β1 + β2X + ϵ where, β1 is the intercept and β2 is the slope. This article is intended for someone who has basic understanding of Linear Regression; probably person has used some other tool like SAS or R for Linear Regression Analysis. His poker night! Mar 24, 2018 - Explore Elaine TheDataGal's board \"Linear regression\" on Pinterest. In statistics, there are two types of linear regression, simple linear regression, and multiple linear regression. I do have a linear style, but other than that, there's a lot of abstract. Table V shows results of stepwise multiple linear regression analysis of outcome variables from the ventilated in Linear Regression Example¶. A data model explicitly describes a relationship between predictor and response variables. I just go off on what I'm thinking. Christ is revered as the Prince of Peace, but more blood has been shed in his name than any other figure in history. It’s simple, and it has survived for hundreds of years. 103 sentence examples: 1. Multivariate Regression for Panel Data with Different Slopes. Understanding linear regression. The height of the channel is based on the deviation of price to the median line. So life demands risks.”, “Myth is already enlightenment, and enlightenment reverts to mythology.”, “All we may expect of time is its reversibility. Wir suchen bei der Regression demnach eine Funktion , die unsere Punktwolke – mit der wir uns zutrauen, Vorhersagen über die abhängige Variable vornehmen zu können – möglichst gut beschreibt. Open Live Script. Bearing the raw meat home from the kill in the jungle! It is a fact that, as linear time and history have retreated, we have been left with the ephemerality of networks and fashion, which is unbearable. Speed and acceleration are merely the dream of making time reversible. I've always been fascinated by the operation of memory - the way in which it is not linear but fragmented, and its ambivalence. That is why these interviews never go well for me. For example, \"largest * in the world\". For instance, we all know Moore’s law: that the number of transistors on a computer chip doubles every two years. I'm not sure how that happens, but certainly you take a look at dinosaurs. y = m*x + c. where y is the estimated dependent variable, m is the regression coefficient, or what is commonly called the slope, x is the independent variable and c is a constant. Humanity will never move forward, spiritually or morally, to become superior beings.”, “Regression lives on, not because of the unavailability of a better option but because of the inertia and fear of change. By the same token, not everyone has what it takes to pay the price for indulging in it and maintaining it, relentlessly, under all circumstances.”, “Amokläufe, Kriege und destruktives Verhalten im Allgemeinen sind Folgeerscheinungen unbewußter Abwehrvorgänge, wenn verdrängte suizidale Tendenzen in Massenmord und Zerstörung umgesetzt und in ihnen manifest werden.”, “We are regressing from narrow mindedness to nano mindedness\".”, “Technological progression can lead to or be a sign of cultural regression.”, Marieta Maglas- Eschatological Regression, Rise Up and Salute the Sun: The Writings of Suzy Kassem, The Conflict: How Modern Motherhood Undermines the Status of Women, Dialectic of Enlightenment: Philosophical Fragments, 37 Seconds: Dying Revealed Heaven's Help--A Mother's Journey. 24 matching entries found. Just a moment while we sign you in to your Goodreads account. In addition, multiple linear regression can be used to study the relationship between several predictor variables and a response variable. The aim of linear regression is to model a continuous variable Y as a mathematical function of one or more X variable (s), so that we can use this regression model to predict the Y when only the X is known. If we required a certain amount of troops per 25,000 population in the Balkans, if the world is not radically different, something of the same extent is going to be needed in Iraq. 103 sentence examples: 1. Quote; First Post: Aug 9, 2007 2:08am Aug 9, 2007 2:08am ZInvestor | ... All lines in the linear regression channel to be adjustable to my settings 30pips 50pips 200pips etc... 2, the Median center line adjustable to off center to see if there is any balance above and below it. Wir arbeiten also in einer zwei-dimensionalen Welt. Night falls and the other apes gather! Let’s add 10 more customers age between 60 to 70, and train our linear regression model, finding the best fit line. ― Dorothy M. Neddermeyer. Upon visual inspection, some regression lines appear to fit the data better than others. But it will take a second. Such things as art - as poetry and music - such kinds of new light have come into the world since then! Linear regression was used for comparison with different variables. Life belongs to the future and I believe in creating History rather than visiting and revisiting the past.”, “The recession and regression of any society are always an indication of how poorly the citizens of that country understand the value of time.”. Custom and user added quotes with pictures. This makes the computation simple enough to perform on a handheld calculator, or simple software programs, and all will get the same solution. This quote from renowned data scientist Tom Redman gives us the best possible explanationof linear regression. My comedy breathes; it's not really that predictable. In statistics, linear regression is a linear approach to modelling the relationship between a scalar response and one or more explanatory variables (also known as dependent and independent variables). Dieser wird als Bias, selten auch als Default-Wert, bezeic… This example uses the only the first feature of the diabetes dataset, in order to illustrate a two-dimensional plot of this regression technique. Pingback: Lineare Regression und Anwendung in Python – Statis Quo Aleksandra 16. Alice Miller Regression to the stage of early infancy is not a suitable method in and of itself. Each of us can manifest the properties of a field of consciousness that transcends space, time, and linear causality. This gives us the multiple regression as follows: Here we will combine equations I . Welcome to the introduction to the Linear Regression section of the Machine Learning with Python. That we have got to make grow! Regression Quotes. Linear Regression channel contains two extra lines above and below the standard linear regression line. tags: anxiety , depressed , depression , esteem , hypnosis , panic , regression , self-confidence. Thousands and thousands of years have passed him right by, and there he is - Stanley Kowalski - survivor of the Stone Age! Put a word or phrase inside quotes. Yes, something - ape-like about him, like one of those pictures I've seen in - anthropological studies! 6. This is precisely what makes linear regression so popular. I take advantage of the second and the moment. I write hundreds of pages per book that never make it into print. Well, I suppose what you're doing is you're making the mistake as seeing time as linear. Don't - don't hang back with the brutes!”, “There are things about organized religion which I resent. Search for wildcards or unknown words Put a * in your word or phrase where you want to leave a placeholder. And cling to, and hold as our flag! Reorder the categories of the categorical predictor to control the reference level in the model. This article provides a basic introduction to linear regression analysis, as well as instructions on how to perform a so-called \"simple\" linear regression (i.e., the model uses a single independent variable to estimate the dependent variable) in Access, using first a purely native Jet SQL approach, and then using a Visual Basic for Applications (VBA) user defined function to simplify the … I'm not that topical. The simplest form of the regression equation with one dependent and one independent variable is defined by the formula . A linear regression channel consists of a median line with 2 parallel lines, above and below it, at the same distance. Linear regression is the simplest of these methods because it is a closed form function that can be solved algebraically. ist ein Ausdruck für die Varianz, die vom Modell nicht erklärt wird und normalerweise nur als \"Fehler\" … I'm quite well, thank you. Indicators of the bumper close planting tea orchard can be obtained from linear regression equation. Quotes tagged as \"regression\" Showing 1-23 of 23. Eats like one, moves like one, talks like one! It is time that we start to think, to feel, to see the universe in a way that is uncultivated, primitive - but this is also without doubt the most difficult thing in the world to do.”, “In today's world, honesty has unfortunately morphed into an extremely expensive hobby...and is no more a virtue that it once was. Pearson's subsequent work included further development of multiple regression as well as innovative progress on other statistics such as chi-square (Pearson 1938). Narrative is linear, but action has breadth and depth as well as height and is solid. Die lineare Regression verwendet die allgemeine lineare Gleichung wobei eine kontinuierliche abhängige Variable und unabhängige Variablen ist sind in der Regel kontinuierlicher (aber auch binär sein kann, beispielsweise wenn das lineare Modell in einem t- verwendet wird Test) oder andere diskrete Domänen. The plot shows that each regression line has a different intercept but the same slope. Doing linear scans over an associative array is like trying to club someone to death with a loaded Uzi. This law was derived by using regression a Showing search results for \"Linear Regression\" sorted by relevance. “Life is ten percent what you experience and ninety percent how you respond to it.”. In other words, to learn from the child, we must have empathy, and empathy grows as we learn. If 1 standard deviation is used then linear regression channel covers 68% of prices for a given period, while if 2 standard deviations are used then it covers 95% of prices. I like to talk about me and my experiences. 3. Linear Regression Channel indicator (LRC) plots a linear regression line and two other lines that are a specified standard deviation away. QUOTES. And you - you here - waiting for him! Maybe he'll strike you or maybe grunt and kiss you! As with simple linear regression and the correlation coefficient, Galton laid the imaginative groundwork that Pearson later developed into a rigorous mathematical treatment. See more ideas about linear regression, regression, high school math. Maybe we are a long way from beng made in God's image, but Stella - my sister - there has been some progress since then! Those lines can be seen as support and resistance. 2 Likes. But when lip service to some mysterious deity permits bestiality on Wednesday and absolution on Sunday—count me out.”, “Nature has established patterns originating in the return of events, but only for the most part. Here we will combine equations 1 and 2. Really, I'm incredibly disjointed and not candid. The data were analyzed by broad linear regression to carry the single factor and multifactorial analysis. All that remain are the rudiments of a supratemporal peripeteia—a few short sequences, a few whirling moments, like the ones physicists observe in certain particles.”, “I don't like regressing - I move beyond. Feb 29, 2016 - Explore Katrina Hall's board \"LINEAR REGRESSION\", followed by 433 people on Pinterest. There in the front of the cave, all grunting like him, and swilling and gnawing and hulking! I've never been convinced that experience is linear, circular, or even random. For example, camera $50..$100. In this dark march towards what-ever it is we're approaching . See more ideas about linear regression, regression, regression analysis. Inhaltsverzeichnis. Multiple regression: Linear. Linear regression is suitable for predicting output that is continuous value, such as predicting the price of a property. I wanted only to help the truth burst forth. It just is. Hey Alex, deine Erklärungen sind sehr hilfreich und ich bin sehr dankbar für deine Arbeit. Regression to the stage of early infancy is not a suitable method in and of itself. It is inevitable that machines will one day become the ultimate enemies of mankind. Die lineare Regression wird hier beispielhaft erläutert, sodass für eine theoretischere Einführung auf Kapitel 19 aus dem Buch Einführung in die Statistik: Analyse und Modellierung von Daten von Rainer Schlittgen sowie Wikipedia - Lineare Regression verwiesen wird. Both the linear and the logistic regression line. For example, a 20 period Linear Regression Indicator will equal the ending value of a Linear Regression line … The graph is a linear regression of. - you call it - this party of apes! Dabei ist der Zielwert (abhängige Variable) und der Eingabewert. Also the li machine learning concept which is used to build or train the models (mathematical structure or equation) for solving supervised learning problems related to predicting numerical (regression) or categorical (classification) value This means that there will be an exact solution for the regression parameters. New illnesses flood the human race, so that no matter how many experiments you have done on corpses, you have not thereby immposd a limit on the nature of events so that in the future they could not vary.”, “In another thirty to fifty years, the demand for cheap labor will have produced even more machines over the employment of actual humans. Such a regression can only be effective if it happens in the natural course of therapy and if the client is able to maintain adult consciousness at the same time. Alice Miller Learning is a result of listening, which in turn leads to even better listening and attentiveness to the other person. Its prediction output can be any real number, range from negative infinity to infinity. If you hang around long enough, you can find the linear path. Regression to the stage of early infancy is not a suitable method in and of itself. Then, use anova to test the significance of the categorical variable. So much of what we do as artists is a combination of personal experience and imagination, and how that all creeps into your work is not so linear. But it is possible that, in the days ahead, these years we have lived through may eventually be thought of simply as a period of disturbance and regression. The first parameter is the number of bars to use in the calculation, and the second parameter is the number of standard deviations to use to draw the channel above and below the Linear Regression Line. Linear and polynomial regression calculate the best-fit line for one or more XY datasets. That is, if kisses have been discovered yet! “Suppose you’re a sales manager trying to predict next month’s numbers. Such a regression can only be effective if it happens in the natural course of therapy and if the client is able to maintain adult consciousness at the same time. No, absolutely not, writing doesn't have to be like a jigsaw puzzle, it can be a very linear undertaking. For example, \"tallest building\". You hope that by speeding up time, it will start to whirl like a fluid. Somebody growls - some creature snatches at something - the fight is on! The regression line is a straight line. Well, let's assume the world is linear. The median line is calculated based on linear regression of the closing prices but the source can also be set to open, high or low. I try to put it in some kind of order to extract meaning from it, to bring meaning to it. The Linear Regression Indicator plots the ending value of a Linear Regression Line for a specified number of bars; showing, statistically, where the price is expected to be. Overview. Combine searches Put \"OR\" between each search query. In case user wants to know more about Linear Regression then please […] We are not evolving or progressing with our technology, only regressing. Such a regression can only be effective if it happens in the natural course of therapy and if th. Die Variable (Alpha) ist der -Achsenschnitt bei . There's even something -sub-human -something not quite to the stage of humanity yet! In some kinds of people some tendered feelings have had some little beginning! Alice Miller It is very difficult for people to believe the simple fact that every persecutor was once a victim. Linear regression is one of the most basic statistical models out there, its results can be interpreted by almost everyone, and it has been around since the 19th century. For example, marathon OR race. I am a very linear thinker, so I write beginning to end. “Basic misunderstandings about DID encountered in the therapeutic community include the following: “I don't want to progress, I want to regress. Problem #2: Sensitive to imbalance data . I'm for anything and everything that bodes love and consideration for my fellow man. Search within a range of numbers Put .. between two numbers. A known devil is NOT better than an unknown one because there is a fifty percent chance that unknown may not be a devil at all.”, “History fancies itself linear - but yields to a cyclical temptation.”, “The tyranny of maternal duty is not new, but it has become considerably more pronounced with the rise of naturalism, and it has thus far produced neither a matriarchy nor sexual equality, but rather a regression in women's status.”, “We stand the risk of regression, because you refused to take risks. Linear regression fits a data model that is linear in the model coefficients. The case of one explanatory variable is called simple linear regression; for more than one, the process is called multiple linear regression. Just in general, my thoughts tend to come out in little spurts that don't necessarily connect.\n\nBelif The True Cream Aqua Bomb Uk, Roland Fantom Fa-76 Manual, Spyderco Native 5 G10 S110v, Brain Rehabilitation Program Uk, Representativeness Heuristic Example, Blondor Pale Silver /81, Nurses Educational Funds Scholarships, Glycolic Acid And Retinol The Ordinary, Barndominium Iowa For Sale, Earth Oven Recipes, Chert Grain Size, Principles Of Instrumental Analysis 7th Edition Solution Manual,\n\nlinear regression quotes\n\nDodaj komentarz\n", "pred_label": "__label__1", "pred_score_pos": 0.8391115069389343} {"content": "• launcherindonesia\n\nThe Role of Digital Footprint and its Potential Hazard\n\nBy: Rahmat Adrian (rahmat.adrian@launcher.id) and Rahel Manurung\n\nNowadays, there are more than 150 million internet users in Indonesia, who in average spend 8 hours and 36 minutes online every day. Visiting one website to another one, using the internet to show the direction to a destination, and creating a new account to enjoy facilities offered by an online platform. Moreover, during this time of the pandemic, people rely more on the internet to connect them with other people, to conduct online meetings and e-learning, as well as to buy their daily needs. This leads to the increased use of the internet in daily life as one of the Indonesian internet providers reported 16 percent increase in its broadband traffic during the COVID-19 pandemic. Each time the internet users conduct online activities, they leave behind their digital footprint.\n\nWhat is a digital footprint?\n\nInternational Data Corp defines a digital footprint as a capsule that holds all information on the activity of internet users. The information includes the internet users’ personal data, which is defined by the Government Regulation Number 71 of 2019 on the Implementation of Electronic Systems and Transactions (“GR 71/2019”) as all data related to an identified and/or identifiable person which can be identified separately or combined with other information, directly or indirectly through electronic and non-electronic systems.\n\nIt is not exaggeratedly claimed that data is the new oil of the world. Data is deemed to be highly valuable commodity these days, therefore it is necessary to learn the roles and also anticipate the potential hazard that might emerge from having a digital footprint.\n\nThe Role of Digital Footprint\n\nAs internet users, a digital footprint is deemed to be very helpful in many parts of their life. For example, it helps you to find the history of websites that you have visited previously, it personalizes an advertisement so it will be easier for you to find the things that suit your interests, and it also helps you remember your data without having to retyping it all over again. All these things can efficiently help you save some of your valuable time.\n\nA digital footprint can say a lot about one person, including its credibility. Since the digital footprint is freely and easily accessible, nowadays, many companies that want to hire employees are likely to explore the candidate’s digital footprint, to ensure that they are not hiring the problematic candidate. And vice versa, each individual can look into a company’s digital footprint to make sure they are not applying to the “shady” company. A digital footprint can prevent you from buying things from the non-credible online stores. And also, can help any online store to build up its credibility from the ground. Thus, it is important to maintain your digital footprint, the way you expect others to determine your personal image.\n\nThe Potential Hazard of Digital Footprint\n\nAs mentioned above, a digital footprint contains internet users’ personal data. The digital footprint is formed in a small form, therefore most of the time the internet users don’t see it as a problem. However, if digital footprints are accumulated into one, these become patterns. These patterns of online habit could be used as the source to identify the digital behavior of a person. What does the user do for a living? Where does he go to work? What time does he usually go back from office? are personal data that the users, by their own will, casually post and share on their social media account. However, these activities are prone to the probability of cybercrimes to occur, such as scams and hacking.\n\nMoreover, pursuant to GR 71/2019 and Minister of Communication and Information Technology Regulation Number 20 of 2016 on the Protection of Personal Data (“MOCI Reg. 20/2016”), an internet platform or a company that collects personal data through the internet is obligated to protect the personal data. However, there is still a high probability for any internet platform or a company to experience a data breach. And if this happens, it will harm the personal data owner. For example, if a data breach occurs and the personal data becomes accessible to an unauthorized party, such party can log in to the data owner’s online bank account, track down the personal data owner’s home address, blackmail the personal data owners for the sake of money, power, and many more.\n\nHow the Prevailing Regulations Can Reduce the Potential Hazard\n\nThe prevailing regulations in Indonesia recognise several rights that can help to reduce the potential hazard of digital footprint.\n\nAccording to the Law Number 11 of 2008 on Electronic Information and Transaction, as amended by Law Number 19 of 2016 (“EIT Law”), personal data is recognised as part of privacy rights. EIT Law stipulates that the use of any information through electronic media that involves personal data of a person, must be made with the consent of the person himself. And any person whose right is infringed has the right to file a claim for damages incurred. This provision gives the personal data owner the right to be “in control” of its own personal data.\n\nOther than that, GR 71/2019 and MOCI Reg. 20/2016 acknowledge the right to erasure, which is equivalent to the right to be forgotten based on General Data Protection Regulation. This right allows the personal data owner to request the erasure of their personal data. Exercising the right to erasure can help reducing the potential hazard that might emerge from a digital footprint.\n\nHow the Upcoming Personal Data Protection Regulation Can Reduce the Potential Hazard\n\nOn 24 January 2020, the Indonesian Government has submitted the final draft of Personal Data Protection Bill (“PDP Bill Draft”) to the Indonesian House of Representatives.\n\nThe PDP Bill Draft regulates new rights of personal data owners that are deemed to protect personal data owners and to reduce the potential hazard of digital footprint. One of which is the right to decide on the processing of personal data using a pseudonym mechanism. PDP Bill Draft defines a pseudonym mechanism as a processing of personal data in which the personal data can no longer be associated with its personal data owner without using an additional information provided, to ensure those personal data cannot be associated with the identified owner or identifiable personal data.\n\nBy exercising this right, the personal data owner can give their personal data without worrying to be identified. Therefore, this should be lower the risk of potential data breach and safeguard personal data.\n\nAll content presented herein is for informational purposes only. Nothing should be construed as legal advice. Transmission and receipt of this information is not intended to create and does not constitute, an attorney-client relationship with PT Sinergi Konsultasi Indonesia. There is no expectation of attorney-client privilege or confidentiality of anything you may communicate to us in this forum. Do not act upon any information presented without seeking professional counsel.\n\nLAUNCHER.ID provides business advisory and establishment services giving shape to your company's values in changing Indonesian market with the experienced consultant and professional tech-team.\n\n\n\n\n\nPrivacy Policy\n\nTerms of Use\n\n\n\n© 2019 by PT Sinergi Konsultasi Indonesia | LAUNCHER.ID ​\n\nPT Sinergi Konsultasi Indonesia is a registered limited liability company (Perseroan Terbatas) under the laws of the Republic of Indonesia.", "pred_label": "__label__1", "pred_score_pos": 0.733176589012146} {"content": "Resources | LpR Article | Quality | Perception | Sep 25, 2017\n\nLighting to Achieve Optimal Appearance\n\nVisual appearance of an object or space depends on the characteristics of the lighting applied. The objective definition of light quality often doesn’t tell the whole story. Light intensity, its spectral composition and distribution in space, as well as individual preference, must be considered. Nevertheless, aiming for the absolute optimum is only recommended when private rooms are concerned. As visual appearance is key in driving consumer demand, it is important to tune the light to maximize effectiveness and visual pleasure for most consumers. Markus Reisinger, owner and CEO of the Lighting Research Studio, discusses this complex situation with examples.\n\nVisual appearance of an object or a space depends on the characteristics of the lighting applied. Among the parameters that influence appearance are light intensity, its spectral composition and the distribution in space. If all parameters are well chosen a consumer will experience the setting as a visually orchestrated scene. If parameters need to be tuned for optimal appearance, then individual preference must be taken into account. It is likely that solutions for different people show similarities, but at the same time it is very unlikely that one setting is optimal for a group of people. This is because different personal experiences do influence expectations. Also different sensory and cognitive capabilities do impact what is perceived. Thus aiming for the absolute optimum is only to recommend when private rooms are concerned. For other spatial situations the immediate goal is to reach conditions that are acceptable for all. In an additional step, the group can aim to find conditions that are close to optimal. As already mentioned optimal appearance depends on the perceiving subject, but it also depends on the context. A person that likes one light setting in an office will characterize the same setting as boring when present in a hotel lobby. For many spaces, objects, surfaces and products, their visual appearance is key in driving consumer demand. Therefore it is important to tune the light to maximize effectiveness and visual pleasure.\n\nConsumer Response and Model\n\nThe behavior of consumers is a result of their intentions and how they evaluate cognitively and affectively the situation. The following scheme visualizes how lighting design can influence consumer behavior. By setting relevant goals and following them up in the design, spatial settings are produced that evoke intended pictures and behaviors in the consumer.\n\nThe model points out that individual preference and situational factors are moderating perceptual processes and responses. For example, individual preferences for colors depend a lot on a person’s scope of experiences. What one person likes or dislikes will also depend on the personality and the socio-cultural context that shaped their opinions. Among the situational factors there are sequence effects, social setting, location and time specific features that impact decisions. Good lighting has a positive impact on the experience of a place. Successful lighting concepts take context specific requirements into account. Results from empirical studies are excellent opportunities to ensure that a lighting solution is adequate for given context. Research studies are often executed in idealized conditions, therefore it is important to check that settings are comparable and thus allow transfer of the results. As an example of a preference study, the results of visual appearance under warm (3000 K) and cool (4000 K) LED lighting are provided [1]. The mentioned paper additionally includes a section that shows the usage of semantic space to categorize perceptions along the axes warm-cool and hard-soft.\n\nFigure 2: Preferences for appearance of color and wood samples in cool or warm light\n\nThe results confirm that LED lighting with a correlated color temperature of 3000 K is generally preferred for reddish hues. Cooler light is generally preferred for bluish hues. Preferences for other hues including the pastel samples were not fully conclusive. The wood samples show by tendency, that cooler light suit wood surfaces as robinia better. This cannot be explained by the spectral reflection characteristics. Therefore it can be assumed that the appearance of wood surfaces is influenced by grain, texture pattern and gloss. Focusing on the appearance of materials, one may structure specific characteristics along three modes of appearance. Green-Armytage and Caivano describe that matt, glossy, textured and metallic aspects of appearance are characteristics of the surface mode of appearance. The volume mode can vary between clear (transparent) and cloudy (translucent). In the illuminant mode light sources may appear in varying degrees of brightness with a maximum that can be described as glare [2]. It requires a deep understanding of the effects of light and constraints to master light and therewith optimize appearance. Dependent on the spatial distribution of light surfaces appear uniformly lit or not. The main direction the light comes from articulates itself in the shadowing pattern. Software packages for lighting simulation are today, the most common tools to plan the luminous environment. Rendered pictures simulate distributions of light and the appearance of objects. In the future, descriptions of the light field could become an alternative tool to predict appearance. Also, in the domain of color appearance there are more and more tools available to anticipate the impact that different spectral power distributions of light have. One example is provided by the Illuminating Engineering Society of North America (IES). The technical memorandum TM-30-15 defines a method to characterize color rendering properties [3]. The role of these tools is to link measurable physical quantities to perceptual correlates. Lighting variables that influence visual appearance can be categorized according to their spatial, spectral or temporal characteristics. Technical tools that deal with the spatial and the spectral dimension are mentioned in table 1; Professional tools that cover the temporal dimension are not yet available.\n\nTable 1: Technical tools to predict appearance\n\nNowadays, there are an increasing number of software packages for optic simulation and lighting simulation that work with spectral data sets. Most probably not very far in the future, simulations of spatial and spectral domains will merge. Multispectral images are other examples where spectral and spatial data is collected. One bottleneck for these approaches is that there are no displays that are able to represent resulting images.\n\nCase Examples\n\nShopping at the market or in the grocery store? There are certainly many reasons why you should buy groceries either at the market or in a shop. To focus on the impact of lighting, only reasons that impact visual appearance are considered. The lighting design for the grocery store was executed under the premises to achieve a natural appearance. Hence, the chosen light equipment mimics daylight and provides light with a correlated color temperature of 6000 K. The light level is within the range that is typical for shop applications. This case is meant to map challenges that are associated with achieving optimal appearance.\n\nFigure 3: The grocery shopping case\n\nWhat the two female customers observe in the shop is indeed, in respect to color, a very natural appearance of fruit, vegetables, meat and fish. On the other hand both costumers have extensive experience from other shops and have in mind that food is often illuminated with light that corresponds to a CCT of 3500 K or 4000 K. Lighting specialists know from a study with multispectral images that an average CCT of 4500 K was preferred for all four food categories [4]. The impression of the customers is that the groceries in the shop don’t look convincing enough. What they implicitly do is to link a not fully satisfying appearance to the quality of the goods and not the light condition in the shop. This behavior is typical. Only when there are very obvious indicators for failures in shop design or maintenance customers start to consider the role of lighting. For the two customers the conclusion is clear, the food in the shop does not look attractive enough so they will not buy here. A short while later the two reach the market. Temperature outdoors is comfortable; the sky has a few clouds. The light level outdoors is somewhat higher than in the shop but the appearance of fruits, vegetables, meat and fish is very similar to the appearance in the grocery store. Despite that, interpretations are quite different. Indeed everything looks natural.\n\nAs they are now outdoors, this look is also the preferred one. If color temperature is measured it would prove that it corresponds exactly to the situation inside the shop. In the end, the two customers buy their food here. Unconsciously they also check preference patterns as they look some meters ahead. One person forgot to switch off the halogen floodlight he has used in the morning. The goods shown in a mixture of electric light and daylight do appear in this situation not as natural as the other. They simply look less attractive and are less preferred by consumers at the market.\n\nThe grocery shopping case can illustrate several important perceptual aspects. A consumer’s decision is strongly influenced by processes that happen unconsciously. Right at the beginning when a person starts to observe a scene, the human visual system extracts the gist of it [5]. All following perceptions are guided by this first impression. Visual and spatial references also influence what consumers expect and what finally perceive. The case demonstrates how important it is that lighting appears adequate for the given context. It is not that the color temperature per se defines what is preferred. It is the achieved fit with the temporal and spatial context. Being with two persons might also influence awareness about specific details or cause requests to align visual impressions with each other. Through an active exchange, it might occur that perceiving subjects pull aspects of color quality, contrast, and modeling or brightness distribution out of the unconscious state.\n\nFor some specific applications there is a strong interest to study visual appearance and preference. One of the fields that are well examined is materials used for car dashboards. But also in such privileged context it is a challenge to understand interactions between color, gloss and texture. Even more complex is the situation when metallic and translucent materials are included. That interaction effects can have a dominant presence and can be easily demonstrated with a material sample that has a directional tread. When the material thread is aligned with the light direction, then the resulting visual pattern is very calm. If lighting direction and thread direction are perpendicular, than the visual pattern is so different to the first case, that the observers do not believe that they are looking at the same material [6].\n\nSummary and Conclusions\n\nThroughout the last few years, enormous progress has been made to differentiate responses to visual stimuli. Today much is known about affective responses, interest, surprise and liking. Also, considerable advances were made in understanding symbolic meaning, semantic interpretation and aesthetic impressions. Models about aesthetic experience suggest that cognitive processing of context and content take place parallel to each other in independent channels [7]. At the same time all approaches to study visual perceptions without considerations of other senses have limits. The framework of total appearance might point out a future direction. It was developed for application in the food sector and integrated nonvisual aspects of appearance such as smell, taste (flavor) and also texture as felt in the mouth, in addition to visual texture [8]. Application domains as shops and museums are recognized for their high demands in respect to lighting quality. Among all solutions that are good enough to be accepted, there are some that are more preferred than others. What science cannot provide are recipes for optimal lighting. But from studies, traits can be extracted that guide design.\n\n[1] Reisinger, Markus. 2015. Preferred LED lighting for wood surfaces and colored surfaces. In AIC 2015 Proceedings, Color and Image, 326-331. Tokyo: The Color Science Association of Japan\n\n[2] Caivano, Jose Luis, and Paul Green-Armytage. 2015. Appearance. In Encyclopedia of Color Science and Technology, ed. Ronnier Luo, 1-9. Springer Berlin Heidelberg\n\n[3] Illuminating Engineering Society of North America. 2015. IES method for evaluating light source color rendition: IES TM-30-15.\n\n[4] Masuda, Osamu, and Sérgio M. C. Nascimento. 2013. Best lighting for naturalness and preference. Journal of Vision 13\n\n[5] Tatler, B. W., I. D. Gilchrist, and J. Rusted. 2003. The time course of abstract visual representation. Perception 32: 579-592\n\n[6] Reisinger, Markus. 2017. Identifying preferred surface, colour and lighting characteristics. Journal of the International Colour Association: 69-76\n\n[7] Redies, Christoph. 2015. Combining universal beauty and cultural context in a unifying model of visual aesthetic experience. Frontiers in Human Neuroscience 9\n\n[8] Hutchings, J. B. 1977. The importance of visual appearance of foods to the food processor and the consumer. Journal of Food Quality 1: 267-278\n\n(c) Luger Research e.U. - 2017\n\nAdd comment\n\n\nQuestion: What is 1 + 3 ?\nYour answer:\n\nProvide UVC Disinfection Total Solution for You - Edison Opto\n\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.855527937412262} {"content": "Majority of Britons believe climate-change could end human race: poll\n\nLONDON (Reuters) - A majority of Britons believe that climate-change could end the human race, a poll showed on Wednesday after days of high-profile protests by activists thrust global warming onto the political agenda.\n\nSlideshow ( 2 images )\n\nExtinction Rebellion disrupted London with 11 days of protests that it cast as the biggest act of civil disobedience in recent British history.\n\nThe group set up camps which blocked off major roads in the capital, disrupted transport and targeted major institutions such as Goldman Sachs and Shell.\n\nFollowing the protests, 54 percent of adults agreed that climate-change threatens our extinction as a species, a poll by Comres found, compared to just a quarter who disagreed.\n\nHowever, only 22 percent of the 2,037 people surveyed said they supported the aims and tactics of Extinction Rebellion, with 32 percent in disagreement.\n\n“While most of the public are agreed on the problem and its cause, the poll finds the public less enthusiastic about how Extinction Rebellion is bringing its message to the country,” ComRes Chairman Andrew Hawkins said.\n\n“Its aims and tactics are far more likely to appeal to people under 25, so it is little surprise that the Group’s warning message of human extinction has less resonance with older age groups.”\n\nExtinction Rebellion wants non-violent civil disobedience to force governments to cut carbon emissions and avert a climate crisis it says will bring starvation and social collapse.\n\nThe group has demanded the government declare a climate emergency and to allocate resources to tackling the issue.\n\nA majority of those surveyed said that they would forego at least one overseas trip a year for the sake of the climate, while fewer people agreed that they would be more willing to protest about higher fuel prices than climate-change.\n\nComRes conducted the survey between April 26-28.\n\nReporting by Alistair Smout; editing by Guy Faulconbridge", "pred_label": "__label__1", "pred_score_pos": 0.9950671792030334} {"content": "Anton Lyzin\n\n\nAnton is a skilled software development engineer with over 10 years of commercial development experience for healthcare and e-commerce solutions.\n\nIn 2013 served as a Solution Architect in the Russian System Integrator company, he has built multiple solutions for different industries, including several Russian Top-100 companies.\n\nIn 2016 served as principal Solution Architect for a large e-commerce company. Anton built a robust solution for processing thousands of orders per day, and managing a 1 million items  catalog. His responsibilities included oversight of  the tech team, development, and system improvements.\n\nAnton Lyzin\n\nEngineer, ITMO State University", "pred_label": "__label__1", "pred_score_pos": 0.9986684918403625} {"content": "Decembrists in Zabaikalye\n\nSometimes the authorities made them do senseless work. A small bridge near the Puppet Theatre in Chita has a gloomy\n\nDecembrists in Zabaikalye\n\n\n\nДругие статьи по предмету\n\n\nСдать работу со 100% гаранией\n\nDecembrists in Zabaikalye\n\nThe history of our town is inseparable from the uprising on Senate Square in St. Petersburg of December 14, 1825.\n\nThe participants of the uprising, who could not reconcile themselves to the existing order, denounced it and challenged the Tsar in an armed revolt. This event vent down in history as the Decembrists Uprising and became a landmark in the history of the country. The Decembrists' Uprising failed. More than a hundred officers were sentenced to different terms of exile. Many of the Decembrists were exiled to Chita. The first group of twelve convicts arrived in Chita in June 1827. The life of the Decembrists in Chita was hard.\n\nSometimes the authorities made them do senseless work. A small bridge near the Puppet Theatre in Chita has a gloomy history. The Decembrists lived in Chita for only three years, but they made a great contribution to the cultural development of the region in 1827, only 300 people inhabited Chita; there streets, three churches, two shops, five inns, a candle factory and a few coal mines. The Decembrists were the first to construct roads and erect two-storeyed houses in Chita. They distributed newspapers and magazines which were sent to them from St. Petersburg. The inhabitants of Chita were not used to growing vegetables.\n\nKyuchelbecker and Bobritschev-Pushkin took to growing vegetables, and their efforts were rewarded; the harvests were rich enough to supply both the Decembrists and the native population with potatoes, cucumbers, onions and tomatoes. It is essential to mention that there was not a single school in Chita at that time. Dmitry Zavalishin appealed to the authorities for permission to teach. Children were taught in them, irrespective of their nationality and sex. Corporal punishment was prohibited. The curriculum included handicrafts.\n\nThe Decembrists themselves supplied their pupils with books and pencils. These schools provided both primary and secondary education establishments in Central Russia. Such were the Decembrists, whose love for their suffering country was a lodestar during their penal servitude in Siberia.\n\nСписок литературы\n\nДля подготовки данной работы были использованы материалы с сайта\n\n\nПохожие работы", "pred_label": "__label__1", "pred_score_pos": 0.7609823942184448} {"content": "Grand Sumo Kyushu Place Yokozuna Shirakaba wins 14 wins and 1 loss Hana Nov 24 18:32\n\nYokozuna Shirakaba, who won the 43rd championship on the 23rd of the Sumo Kyushu Place Chiaki Raku on 23rd, won the victory with 14 wins and 1 loss.\n\nWinning or losing after entering the middle.\n\n▽ Nishimiki is close to Omami of the Twelve Cars.\n\n▽ Ishiura throws badly at Ishiura.\n\n▽ Shimano Sea is close to Shimano Sea.\n\n▽ Chiyo Dairyu withdraws Chiyo Dairyu to Chiyo Dairyu.\n\n▽ Kagayaki is the 10th victory for Mt.\n\n▽ Koto Emitsu was taken over by Daisho Maru.\n\n▽ Takesho won the sword sho with a sword sho.\n\n▽ The koto scholar chrysanthemum dropped into the mountain.\n\n▽ The onions of Sada's sea are overtaken by extrusions. Sada's sea has been defeated.\n\n▽ Akio throws up the treasure Fuji, and Takao Fuji throws out.\n\n▽ Ayaki Saki won over by pushing out Myogi Ryu. Abu Saki is overcoming.\n\n▽ Takashi wins the Oki sea, but Takashi wins.\n\n▽ Flame won over Sakae Daisuke by scooping the flame. Daiei Sho, who won the white birch, won the first special medal.\n\n▽ Asanoyama won the third struggle award for Masayo in the early days. Asanoyama, who has won 11 wins, is the first skill award.\n\n▽ Hokusatsu Fuji pushes Ryuden into Hokusatsu Fuji.\n\n▽ Endo wins over with Yuki Koto protruding from Yuki Koto. Endo overcame.\n\n▽ In the Ontake Sea, A flames was the 9th victory because of the misalignment of the Gyoji forces and A flames. Mitake Sea has 6 wins and 9 losses.\n\n▽ Ozeki Yokozuna to Takashige Shirakaba added Hana to the championship with 14 wins and 1 loss with Hakuho taking the first place. Takashigekatsu returned to Ozeki with 9 wins and 6 losses.", "pred_label": "__label__1", "pred_score_pos": 0.8932993412017822} {"content": "The Daily Pennsylvanian is a student-run nonprofit.\n\nPlease support us by disabling your ad blocker on our site.\n\nThe Connected Care Initiative team is top row (left to right): Henry Le, Dr. Nahreen Ahmed, Ananya Dewan. Bottom row (from left to right): Laura Allen, Dr. Jesse Raiten, Suvas Kota. (Photo from Henry Le)\n\nTwo Penn sophomores have launched a telehealth program in a Bangladeshi refugee camp in collaboration with Penn Medicine.\n\nCollege and Wharton sophomores Henry Le and Ananya Dewan started the Connected Care Initiative (CCI), which aims to bring medical care to vulnerable refugee populations through telehealth. The initiative is currently focusing on recruiting physician volunteers, providing telecommunications and diagnostic technologies, and creating telehealth infrastructures to benefit the medical care of refugees. \n\nTelehealth is a budding medical practice defined by the use of communications technology to conduct remote medical care, often to patients who don’t have access to specialty physicians.\n\nThe CCI is currently in its pilot phase, providing technology and remote access to specialists to a Bangladeshi clinic located inside the Kutupalong refugee camp. Kutupalong is the largest refugee camp in the world and is mainly populated by the Rohingya people.\n\nThe Rohingya people are a Muslim minority from the country of Myanmar. In Buddhist-majority Myanmar, they have seen discrimination and threats of genocide, leading them to seek refuge in Bangladesh.\n\nThe project is currently increasing the availability of telecommunications technology and diagnostic equipment available on the ground at refugee clinics. By providing equipment, such as laptops and WiFi access, and creating proper telehealth infrastructures, the project can help maximize the amount of patient information available to physicians, Le said. Physicians and workers on the ground at these clinics can send this information to specialists operating remotely, giving the refugees access to proper care.\n\nBoth Le and Dewan said that the project is driven by their passion for using medicine to protect vulnerable populations.\n\n“Working to improve the access to health care as well as the quality of care delivery is something I’m really passionate about, especially when it comes to these places like Kutupalong,” Dewan said.\n\nLe said the project was catalyzed by the COVID-19 pandemic. Over the summer, the pandemic forced many into remote work, which contributed to the rise of telemedicine.\n\n“We saw borders and barriers being broken down, and wanted to introduce telemedicine to these vulnerable populations,” Le said.\n\nDewan and Le both emphasized that CCI is a group effort. They work closely with two other students: Engineering sophomore Suvas Kota works on the technological front developing telehealth software, while Laura Allen, a junior at George Washington University, aids the initiative’s sustainability.\n\nLe and Dewan created CCI under the mentorship of Penn Medicine faculty members and doctors Jesse Raiten and Nahreen Ahmed.\n\nRaiten, who has a background in global health, helped the students connect and recruit physicians and assisted in navigating the project through the \"red tape,\" or the political or bureaucratic hurdles, of working with refugee camps.\n\n“Anytime you involve other countries, particularly countries that aren’t politically stable or where there is a lot of poverty, a lot of volatility is injected into the situation. That leads to red tape when you’re trying to do a project from abroad,” Raiten said.\n\nAhmed, CCI’s other mentor, who has worked closely with the medical clinic in the camp, helped get the students the connections with the clinic necessary to launch the program.\n\nThough the program is in its pilot phase, Le and Dewan hope to see it expand in the future.\n\n“The core goal of our initiative is to find a way to standardize telemedicine for many of the clinics and refugee camps around the world and fill the inadequacies present in each and every refugee camp. I think we’re united by the mission to make health care truly universal,” Le said.\n", "pred_label": "__label__1", "pred_score_pos": 0.8506834506988525} {"content": "Teaching writing starting in kindergarten: Effects of a tier 2 intervention\n\nTeaching writing starting in kindergarten: Effects of a tier 2 intervention\n\nFirst Author: Meaghan McKenna -- University of South Florida\nAdditional authors/chairs: \nHoward Goldstein; Xigrid Soto\nKeywords: Informational and Opinion Writing Genres, Writing Instruction, At Risk Students, Early Literacy, Kindergarten\nAbstract / Summary: \n\nPurpose- Writing is an essential tool for communicating and learning that is linked to the future success of students educationally and professionally. The objective of this project was to assess if a Tier 2 intervention targeting informational and opinion writing resulted in growth in writing skills of kindergartners identified as poor writers by addressing the following questions: (1) To what extent does a comprehensive writing intervention across three units of instruction improve the writing of kindergartners experiencing delayed writing skills? (2) To what extent do teachers observe improvements and generalization in classroom writing activities?\n\nMethod- The Tier 2 intervention provided systematic and explicit instruction on informational and opinion writing. Lessons provided students with guidance (e.g., goal setting, writing checklist) and practice opportunities. A multiple baseline design across three units of instruction: 1) organization and remaining on topic; 2) capitalization, punctuation, sentence structure, and vocabulary; and 3) handwriting and spelling was used to evaluate intervention effects. Seven kindergarten students participated in two 25-minute intervention sessions and one independent writing session each week. They received a score ranging from 0 to 5 for each skill.\n\nResults- The results of the visual analysis, non-overlap statistics, and multilevel modeling indicate that with the initiation of each phase of intervention, all of the participants made gains in targeted behaviors. Social validity data collected from the students illustrate changes in attitudes towards writing. Students' families provided favorable input and noted improvements in their reading and writing and teachers noted generalization of writing skills to the classroom.\n\nConclusions- These findings demonstrate that when writing intervention is designed around standards, evidence-based practices, and implemented with fidelity, students significantly improve.", "pred_label": "__label__1", "pred_score_pos": 0.9999106526374817} {"content": "/Strep throat prescription,Cvs prozac price\nCvs prozac price\n\nStrep throat prescription\n\nPrescription treatment will help your throat and other symptoms recover quickly. Amoxicillin can cure other infections also such as pneumonia, ear infections, bronchitis, urinary tract infections, and skin infections. Rheumatic fever can lead to painful and inflamed joints, a specific type of rash, or heart. Antibiotics are usually prescribed to treat the strep throat bacteria, to help you feel better faster, and to decrease the chances of you getting serious complications. The most commonly prescribed antibiotics are penicillin and amoxicillin The IDSA guidelines recommend narrow spectrum antibiotics such as penicillin. Strep throat is a bacterial infection that can make https://perfectweightlossplan.org/textual2a350/eadc1056618.htm your throat feel sore and scratchy. If your doctor diagnoses you or your child with strep throat, your doctor will how expensive is vyvanse likely prescribe an oral antibiotic. Antibiotics are the first line of treatment for strep throat and will be prescribed. Some common antibiotics our doctors prescribe for strep throat include: Penicillin, Amoxicillin, Augmentin Your throat hurts. It is important to take these as prescribed and finish the course of treatment. (Waldetoft shared. strep throat prescription ($29). Adverse effects could be a lot more likely and also more extreme in patients with liver illness and/or kidney disorder. One person with myasthenia gravis experienced a degeneration in her problem during augmentin and sinus infection 2 various courses of norfloxacin Amoxicillin. Strep Throat Treatment. Penicillin is the treatment of choice, and strep bacteria hasn’t been found to be resistant to it. In how much does a prescription of humira cost this antibiotic, the main active component is penicillin that helps to fight off bacteria. Someone close to you has strep throat. With no treatment, strep throat continues to be contagious until symptoms resolve If the test is positive, doctors can prescribe antibiotics. Antibiotics are the first line of treatment for strep throat and will be prescribed. pyogenes.S. You may also have a mild fever and aches. Lozenges can help keep the throat moist, and those with anesthetics in them may help relieve strep throat pain. Doctors strep throat prescription usually treat strep throat with antibiotics even though they will not make you well any faster. Yes, our doctors can write prescriptions for strep throat. If untreated, strep throat can cause complications, such as kidney inflammation or rheumatic fever. There are several different antibiotics that can be prescribed for strep throat, but the most common are penicillin and amoxicillin. Streptococcus pyogenes, which are also called group A Streptococcus or group A strep, cause acute pharyngitis known as strep throat Etiology. Don't give aspirin to children or teens.. - insulin lantus solostar", "pred_label": "__label__1", "pred_score_pos": 0.9535684585571289} {"content": "Studio Luthier-Vandermeersch\n\nThe studio builds new instruments, completely hand made. Katrien Vandermeersch specializes in the  making of the violoncello and the bassviolin (bas de violon). Also the tenoralto has been the subject of some projects. The alto and the violin can be built upon request. The inspiration for the construction of these strings comes not only from ancient Italian masters, but from Flemish violin makers from the 17th and 18th century and modern musicians as well. Besides, the interaction between builder and musician greatly influence the chosen model and the specific demands for the instrument.\nKatrien Vandermeersch does not only create new instruments, but does all reparations and restorations as well.\nBecause the studio is such a small enterprise, the quality is high and customers are guaranteed of a personal approach.\n\nKatrien Vandermeersch\n\nKatrien Vandermeersch (°1956 in Sarnia, Canada) started her professional carreer in the graphic area, which explains her eye for detail.
In her craft she is not only fascinated by the sound and the esthetic look of an instrument, but by acoustic research and baroque instruments as well. This is why her baroque instruments have both a warm and a powerful sound to them.", "pred_label": "__label__1", "pred_score_pos": 0.7599396705627441} {"content": "The Mathematics Of Losses\n\nWill a 30% advance after a 30% decline in a portfolio, return the account to the same market value?\n\nThe answer is no. It will actually take a gain of 42.9% to recover the lost capital.\n\nAs an investment loss increases in size, the gain that is required to restore the loss begins to increase at a faster rate. Individual investors have two distinct time horizons that occur over their investment lives:\n\n– An accumulation phase: where the focus is on saving\n– A withdrawal phase: where the focus is on spending\n\nWe all have a finite time horizon to build wealth that is determined by our own mortality. Even if we are diligent savers, we will likely only have 40 years as an accumulation phase before retiring from the work-force and starting some type of a withdrawal phase.\n\nWhat happens if you experience a 30% portfolio loss and are then only able to receive 7.4% annual returns?\n\nLoss                1 Year               2 Years            3 Years                   4 Years                     5 Years\n\n30%                 42.9%                19.5%             12.6%                          9.3%                            7.4%\n\nYou would need five years of 7.4% annual gains to recover the loss, but those five years also represent 12% of the your wealth accumulation years. Those five years have been removed from your accumulation phase and will never return.\n\nRecovery times for losses matter greatly. In fact, they matter even more when an accumulation phase is ending and a transition to a withdrawal phase is beginning.\n\nWhat happens if an 8% withdrawal phase begins immediately after a 30% loss?\n\nLoss                1 Year                 2 Years                3 Years                    4 Years                     5 Years\n\n30%                 61.8%                  31.3%                    22.6%                       18.5%                       16.2%\n\nYou would now need five year annual gains of 16.2% to recover the lost value and cover the required withdrawals. If your portfolio fails to generate these required annual rates of return, then the capital value of the portfolio will erode further.\n\nYou should be concerned not only about the size of investment losses, but also about the amount of time required to recover a loss. The amount of time required to recover can be just as significant to your financial success as the size of the loss.\n\nIgnoring the consequences of financial market uncertainty can be hazardous. Trying to reduce exposure to uncertainty in the midst of financial market turbulence is similar to trying to buy insurance once a house catches fire.\n\nTo truly evaluate financial market uncertainty, you must consider both the magnitude and the likelihood of all possible outcomes. This includes not just the good ones, but also the very bad", "pred_label": "__label__1", "pred_score_pos": 0.9920265674591064} {"content": "The Department of Natural Resources and local law enforcement agencies patrol Georgia’s public lakes and waterways to ensure that everyone on the water is adhering to safety rules, including state rules regarding Boating Under the Influence (BUI). It is not illegal in Georgia to have alcohol in an open container on any boat or personal watercraft (PWC) or for the person operating the boat or PWC to have a drink. However, according to The Georgia Boat Safety Act it is unlawful to operate a boat or PWC if you have a blood alcohol level of 0.02 or more and are under 21 years old, a blood alcohol level of 0.08 or more if you are 21 years of age or older, or if drugs are detected. It is also unlawful for the owner of a boat or PWC to allow anyone else to operate their boat or PWC while that person is under the influence of alcohol or drugs.\n\nImplied Consent\n\nWhile reasonable suspicion is needed to pull over any Georgia driver, law enforcement does not need probable cause to stop a person’s vessel to perform a safety check. Under Georgia’s BUI Implied Consent Law, anyone boating or operating a PWC on the state’s lakes and waterways has consented to a chemical test of his or her blood, breath, or urine to determine the presence of alcohol or drugs if requested by a law enforcement official. If the tests confirm a blood alcohol level over the limit for your age group or the presence of any illegal drug, the results will be used against you at trial. If you refuse to be tested, your privilege to operate a boat or PWC may be suspended for a minimum period of one year and your refusal will be offered into evidence against you at a trial. (A BUI will suspend your boating privileges but will not have any effect on your driving privileges.) It is extremely common for a routine safety inspection to turn into a BUI arrest, so always keep your vessel in compliance with all applicable ordinances, including properly working and positioned lights, the correct number of life jackets, and having a pressurized fire extinguisher. If you are flagged for a safety check, be polite and cooperative, yet do not volunteer too much information. Let the officers do their job and move on to the next vessel without being compelled to administer any sobriety tests.\n\nPenalties and Consequences\n\nA BUI is a misdemeanor crime in Georgia, unless you accumulate four BUIs, at which point they will then turn into felonies. The consequences of a BUI charge is virtually the same as a DUI charge. The maximum penalty for a BUI is 12 months in jail and a $1,000 fine and the minimum penalties are 24 hours in jail, 12 months probation, a $300 fine, 40 hours of community service, and completion of a DUI Alcohol or Drug Use Risk Reduction Course. In total, a BUI conviction can easily cost over $2,500 and will remain forever on your Georgia and National criminal record. All future employers, creditors, law enforcement officials, and government agencies will be able to see the record of your arrest, which can affect your ability to gain future employment, enroll in school, and receive financial aid.", "pred_label": "__label__1", "pred_score_pos": 0.8627102375030518} {"content": "A hypothetical example based on a complicated sequence of sampling events at a given sampling location. In the example the bold rectangles are sampling events, the dashed rectangles measurements or facts, the grey rectangles are occurrences. The arrows between the rectangles illustrate the (hierarchical) relations between the different sampling events and between events and their associated occurrences and measurements. The example shows data sampled using a Van Veen grab, a beam trawl, and a multi-corer. The macrobenthos analysis was based on the complete Van Veen grab sample, while the meiofauna analysis was based on subsamples. The multicore sample was divided into different depth slices. Likewise, an abiotic measurement can refer to the entire sample or to a subsample.\n\n  Part of: De Pooter D, Appeltans W, Bailly N, Bristol S, Deneudt K, Eliezer M, Fujioka E, Giorgetti A, Goldstein P, Lewis M, Lipizer M, Mackay K, Marin M, Moncoiffé G, Nikolopoulou S, Provoost P, Rauch S, Roubicek A, Torres C, van de Putte A, Vandepitte L, Vanhoorne B, Vinci M, Wambiji N, Watts D, Klein Salas E, Hernandez F (2017) Toward a new data standard for combined marine biological and environmental datasets - expanding OBIS beyond species occurrences. Biodiversity Data Journal 5: e10989. https://doi.org/10.3897/BDJ.5.e10989", "pred_label": "__label__1", "pred_score_pos": 0.9548835158348083} {"content": "What Is A Narcissistic Psychopath?\n\nAre psychopaths insane?\n\n3) Psychopaths aren’t crazy.\n\nPsychopathy is a personality disorder, not a mental disorder.\n\nHallucinations and other signs of mental illness usually portrayed as part of psychopathy are actually severe psychosis, or a loss of one’s sense of reality..\n\nWhat is the difference between psychopath and narcissist?\n\nLike persons with APD, narcissists generally lack empathy and tend to have unrealistically high opinions of themselves, and, like psychopaths, narcissists tend to form shallow relationships, to exploit and manipulate others, and to be glib and superficially charming.\n\nAre psychopaths evil?\n\n\nWhat does a narcissist hate?\n\nYou hate having to feel emotions That’s why narcissists abhor them. Feeling an emotion “challenges their sense of perfect autonomy,” he continues. “To admit to a feeling of any kind suggests they can be affected by someone or something outside of them.”\n\nAre Narcissists generous?\n\n\nWhat’s worse a sociopath or a psychopath?\n\n\nCan a psychopath love?\n\n\nWhat does a psychopath want in a relationship?\n\nSelf-confident people are naturally attractive, and psychopaths know that they are found attractive because of this trait. So they will try to seduce the victim through their self-confident and daring behavior. They might also fascinate the victim by their lifestyle which is usually extreme or dangerous in some way.\n\nWhat are the 10 traits of a narcissist?\n\n10 Signs That You’re in a Relationship with a NarcissistConversation Hoarder. The narcissist loves to talk about him or herself, and doesn’t give you a chance to take part in a two-way conversation. … Conversation Interrupter. … Rule Breaker. … Boundary Violator. … False Image Projection. … Entitlement. … Charmer. … Grandiose Personality.More items…•\n\nDo narcissists lack confidence?\n\n\nWhat happens when you stand up to a narcissist?\n\n\nDo narcissists get jealous?\n\n\nCan someone be a narcissist and a psychopath?\n\n\nDo narcissists have a conscience?\n\nThey truly have no conscience, as Robert Hare pointed out so well in his book Without Conscience. They do as they please, and they rationalize everything they do. In most cases, they will not change, and they don’t respond well to therapy.\n\nWhat are psychopathic tendencies?\n\nCommon signs of psychopathy disregarding or violating the rights of others. inability to distinguish between right and wrong. difficulty with showing remorse or empathy. tendency to lie often. manipulating and hurting others.\n\nCan a psychopath have a normal life?\n\n\nWhat turns a narcissist on sexually?\n\n\nDo narcissists dislike themselves deep down inside?\n\nThese results suggest that narcissists do not uniformly dislike themselves ”deep down inside. ” Rather, narcissists report high explicit and implicit self-views on measures of agency, and neutral self-views on measures of communion.", "pred_label": "__label__1", "pred_score_pos": 0.9131183624267578} {"content": "GDPR Drives Debate Over Prescriptive Versus Outcomes-Based Compliance\n\nWith GDPR now in full effect, many companies are scrambling to navigate issues the regulations have created for them, and one question is now being more pointedly discussed by many globally: is prescriptive or performance-based regulation better, specifically where personal data is concerned? The Prescriptive Approach The US and Australia both have a more prescriptive…\n\nHow Effective Compliance Management Can Avoid Supply Chain Disaster\n", "pred_label": "__label__1", "pred_score_pos": 0.9713189601898193} {"content": "How a volcano helped defeat Napoleon at Waterloo\n\n\nBy Caroline Brogan/Imperial College London\n\n\n\nNow, Matthew Genge, from Imperial College London, discovered that electrified volcanic ash from eruptions can “short-circuit” the electrical current of the ionosphere – the upper level of the atmosphere that is responsible for cloud formation.\n\nThe findings, published August 21, 2018, in the peer-reviewed journal Geology, could confirm the suggested link between the eruption and Napoleon’s defeat.\n\nImage via Imperial College London.\n\nGenge, from Imperial’s Department of Earth Science and Engineering, suggests that the Tambora eruption short-circuited the ionosphere, ultimately leading to a pulse of cloud formation. This, he said, brought heavy rain across Europe that contributed to Napoleon Bonaparte’s defeat.\n\nThe paper suggests that eruptions can hurl ash much higher than previously thought into the atmosphere – up to 62 miles (100 km) above ground.\n\nGenge said:\n\n\nLevitating volcanic ash\n\n\n\nThe experimental results are consistent with historical records from other eruptions.\n\nWeather records are sparse for 1815, so to test his theory, Genge examined weather records following the 1883 eruption of another Indonesian volcano, Krakatau.\n\n\nIonosphere disturbances and rare clouds\n\n\nIn addition, a special cloud type appeared more frequently than usual following the Krakatau eruption. Noctilucent clouds are rare and luminous, and form in the ionosphere. Genge suggests these clouds therefore provide evidence for the electrostatic levitation of ash from large volcanic eruptions.\n\nGenge said:\n\n\nBottom line: Electrically charged volcanic ash short-circuited Earth’s atmosphere in 1815, causing global poor weather and Napoleon’s defeat, says new research.\n\nEarthSky Voices", "pred_label": "__label__1", "pred_score_pos": 0.6631245017051697} {"content": "Shrimp Recipes\n\nWith over 40 recipes in the Shrimp Collection, there are so many options for ways to prepare shrimp! Cold Peanut Soba Noodles with Grilled Shrimp, Baked Shrimp Taquitos, and Quick and Easy Shrimp Linguine are few examples of the variety. Grilled, baked, simmered, and pan-fried shrimp are the top cooking methods creating a quick meal for weeknights or weekends.", "pred_label": "__label__1", "pred_score_pos": 0.7224313020706177} {"content": "Quick Answer: How Old Is Oldest Human Remains?\n\nWhen was Adam and Eve born?\n\n\n\nIs Lucy the oldest human fossil?\n\nLucy, a 3.2 million-year old fossil skeleton of a human ancestor, was discovered in 1974 in Hadar, Ethiopia. The fossil locality at Hadar where the pieces of Lucy’s skeleton were discovered is known to scientists as Afar Locality 288 (A.L. 288).\n\nWho was the first human?\n\n\nWhere is the first human found?\n\n\nCan humans be Fossilised?\n\n\nThe male analog to the “Mitochondrial Eve” is the “Y-chromosomal Adam” (or Y-MRCA), the individual from whom all living humans are patrilineally descended. As the identity of both matrilineal and patrilineal MRCAs is dependent on genealogical history (pedigree collapse), they need not have lived at the same time.\n\nWhen did humans first appear on Earth?\n\n\nWhat is the oldest skeleton in the world?\n\nLucy (Australopithecus)Catalog no.AL 288-1Common nameLucySpeciesAustralopithecus afarensisAge3.2 million yearsPlace discoveredAfar Depression, Ethiopia3 more rows\n\nHow did Lucy actually die?\n\nScientists Divided Over How Lucy Died : The Two-Way A new study suggests the 3.2 million-year-old hominin died when she fell from a tree and fractured her bones.\n\nWhat animal did humans evolve from?\n\n\nWill humans go extinct?\n\n\nWho created earth?\n\n\nWhat are the 3 human races?\n\n\nAre we all from Africa?\n\n\nHow many human races are there?\n\n\nHow did life start on earth?\n\nThe earliest known life-forms are putative fossilized microorganisms, found in hydrothermal vent precipitates, that may have lived as early as 4.28 Gya (billion years ago), relatively soon after the oceans formed 4.41 Gya, and not long after the formation of the Earth 4.54 Gya.\n\nHow old is the oldest known human fossil?\n\n2 million yearsThe oldest reliably classified fossils belonging to the genus Homo date back to a little over 2 million years ago. They belong to H. habilis, a type of ancient hominin that scientists classify as the first of our genus, and which may have led to H. erectus, one of our direct ancestors.\n\nWhat color was the first human?\n\n\nWhere is the first human from?\n\n\nWhat is the oldest race in the world?\n", "pred_label": "__label__1", "pred_score_pos": 0.6177492141723633} {"content": "quote by Albert Einstein\n\n\n— Albert Einstein\n\nUplifting harry truman quotes that are about atomic habits\n\nAtomic quote The universe is not made of atoms, but of stories.\n\nThe universe is not made of atoms, but of stories.\n\nThe body is a fortuitous concourse of atoms.\n\n\n\nAtomic quote We forget we're mostly water till the rain falls and every atom in our body star\n\n\n\nWe are the gods of the atoms that make up ourselves but we are also the atoms of the gods that make up the universe.\n\n\n\n\n\nMy dream is to drop three atomic bombs on New York City.\n\n\n\n\n\n\nThe release of atomic energy has not created a new problem.\n\n\nEmancipate yourself from mental slavery.\n\nIn films, we are trained by the American way of moviemaking to think we must understand and 'get' everything right away. But this is not possible. When you eat a potato, you don't understand each atom of the potato!\n\n\n\nWars cannot be won by destroying women and children\n\nAll the atoms of our bodies will be blown into space in the disintegration of the solar system, to live on forever as mass or energy. That's what we should be teaching our children, not fairy tales about angels and seeing grandma in Heaven.\n\nThe molecules that comprise our body are traceable to the crucibles of the centers of stars.These atoms and molecules are in us because, in fact, the universe is in us. And, we are not only figuratively, but literally, stardust.\n\nIf my comrades are not destined to rule the world, then away with it! A shower of atom bombs upon it and in place of its meaningsless chatter about 'love' and 'peace' the voice of the howling wind over its ruins.\n\n\n\n\n\n\nAtomic mass - The atomic mass (ma or m) is the mass of an atom. Although the SI unit of mass is kilogram (symbol: kg), the atomic mass is often expressed in the non-SI\n\nAtomic bombings of Hiroshima and Nagasaki - By August 1945, the Allies' Manhattan Project had produced two types of atomic bombs, and the 509th Composite Group of the United States Army Air Forces\n\n\nAtomic Kitten - Atomic Kitten are a British pop girl group formed in Liverpool in 1998 whose current members are Natasha Hamilton and Liz McClarnon. The group was founded\n\nChemical element - having the same number of protons in its atomic nuclei (that is, the same atomic number, or Z). For example, the atomic number of oxygen is 8, so the element\n\nAtomic clock - An atomic clock is a clock device that uses a hyperfine transition frequency in the microwave, or electron transition frequency in the optical or ultraviolet\n\n\nBut so far, you know who's been violating the nuclear nonproliferation pact day and night? Those who signed it. Iran, Iraq, Libya and Iran violates it while calling for Israel's destruction and racing to develop atomic weapons to that end.\n\n\n\nAtom bombs, something's wrong. D.E.A sent to Guam. Acid Trips, big fat chics. Purple Finstone Vitamins.All the needy rich are greedy. I find out you don't need me. Berlin wall starts to fall. I trip out to the wall. Hooray Horrah\n\nThe present reeks of mediocrity and the atom bomb.\n\n\n\nThe weapons of war must be abolished before they abolish us.\n\n\nfamous quotes", "pred_label": "__label__1", "pred_score_pos": 0.9959421753883362} {"content": "quote by Immanuel Kant\n\n\n— Immanuel Kant\n\nMost Powerful Constraining quotations\n\n\n\nWere I to personify Justice, instead of presenting her blind, I would denominate her the goddess of fire. . . Of unbending integrity Justice should feel, hear and see; but truth alone should be the polar star by which she should shape her movements, and equity only should constrain her determinations.\n\nMen's consciences ought in no sort to be violated, urged, or constrained.\n\n\n\nMasculine anger is always because you are feeling constrained, trapped by life.\n\nFeminine anger is always because you are feeling unloved.\n\n\nBefore the day begins, you are not yet engaged in any physical activities.\n\n\nThe thing about lucid dreams is that it's not like the real world where you are constrained by all sorts of things, including the laws of physics - you can do magic.\n\nI feel sometimes constrained by the expectation that the work should be solely political. I try to create a type of work that is at the service of my own set of criteria, which have to do with beauty and a type of utopia that in some ways speaks to the culture I'm located in.\n\n\n\nIf the authorities constrain banks and are aware of the activities of fringe banks and other financial institutions, they are in a better position to attenuate the disruptive expansionary tendencies of our economy.\n\n\nThe state is concerned with the promotion of outward righteousness arising from the individual being constrained to keep the law. The Gospel alters human nature, whereas the state merely restrains human greed and evil, having no positive power to alter human motivation.\n\n\n\n\nLove will not be constrain'd by mastery.\n\n\n\n\nWave after wave of trial rolled over us;\n\nbut at the end of the year some of us were constrained to confess, that we had learned more of the loving-kindness of the Lord than in any previous year of our lives.\n\nKindly politeness is the slow fruit of advanced reflection;\n\nit is a sort of humanity and kindliness applied to small acts and every day discourse: it bids man soften towards others, and forget himself for the sake of others: it constrains genuine nature, which is selfish and gross.\n\nIf I am to constrain you by any law, it must be one by which I am also bound.\n\n\nThe requirement of conspicuous wastefulness is.\n\n\nMy friend Phil has a theory that the Lord, having made teenagers, felt constrained to make amends and so created the golden retriever.\n\n\nI believe it is urgent to begin now, before we are constrained by a totally controlled society monitoring limited resources on the planet. Now is the time to establish our extraterrestrial base in freedom; later it may be under the coercion of necessity.\n\nHorses are creatures who worship the earth as they gallop on feet of ivory.\n\nConstrained by the wonder of dying and birth, the horses still run, they are free.\n\n\nI mean, I absolutely call myself a feminist.\n\n\n\nfamous quotes", "pred_label": "__label__1", "pred_score_pos": 0.9899340867996216} {"content": "Wednesday, August 21, 2019\n\nChildrens Needs And Violence Against Children\n\nChildrens Needs And Violence Against Children à ¢Ã¢â€š ¬Ã… ¾I do not believe in a child worldà ¢Ã¢â€š ¬Ã‚ ¦ I believe that child should be taught from the very first that the whole world is his world, that adult and child should share one worldà ¢Ã¢â€š ¬Ã‚ ¦ Pearl S. Buck The aim of the following thesis is to present the image of a child in Charles Dickens novel Oliver Twist. On the strength of this novel, the author will attempt to discuss the importance of a childs psychological, physiological and emotional needs, and ways of their fulfilment in the process of a childs development. Children are innocent and defenceless human beings and to ensure their safe and proper growth, they need to be provided with an environment conducive to their healthy development. Adults often overlook the importance of their childs needs, they are simply unaware of their existence, and in consequence, children mature into troubled and unstable individuals. The lack of parental support, which often results in neglect, abuse and childs humiliation, may in fact seriously injure the childs psyche. Most Charles Dickens novels feature an image of a child Pip, Oliver Twist, David Copperfield; in his portrayals Dickens argues that children and adults perceive the world differently. In spite of their limited knowledge and experience children are acute and sensitive observers. In his novels, Dickens shows children, who struggle with the adversities of adult life, children who have no childhood and must survive against the hostile society of the Victorian England caught in the frenzy of the Industrial Revolution. The author relies often on his own experiences, his childhood was disturbed by the tragedies in his own family, which gives his novels a sense of authenticity. Charles Dickens was born on 7th February 1812 in Portsmouth in England as a son of John and Elizabeth Dickens. His fathers irresponsibility and lack of ambitions were the reasons why his family situation was often uncertain. He was always in debt and, as a consequence, in 1824, when Charles was only twelve years old, his father was imprisoned, together with his family. However, through his uncles instigation, young Charles found employment at a newly opened blacking factory and was spared from the prisons sentence. Michael Slater, Dickenss biographer, shows how this experience influenced small Dickens: à ¢Ã¢â€š ¬Ã‚ ¦Dickens leaves no doubt as to the degree of the psychological and emotional earthquake suffered by his twelve-year-old self: It is wonderful to me how I could have been so easily cast away at such an ageà ¢Ã¢â€š ¬Ã‚ ¦ No advice, no counsel, no encouragement, no consolation, no support, from any one [à ¢Ã¢â€š ¬Ã‚ ¦] I might easily have been, for any care that was taken of me, a little robber or a little vagabond.  [1]   Dickens is an expert at childrens feelings and emotions, and through his works, he urges adults to be sensitive towards their fragile personalities. His novels, and his child characters, witness the abuse of children in the Victorian Period. His works were to give voice to children who desperately needed help and who rarely were able to communicate their needs and even more seldom obtained the help they needed. The first chapter of the following thesis is divided into four parts. In the first part, the author will describe the importance of childrens psychological needs necessary to their proper growth. The emphasis will be placed upon the needs fulfilment methods and the consequences of not fulfilling them: a lack of a childs psychic stability, problems in adolescence, etc. In the second part of Chapter One, the author will discuss violence against children in the Victorian Period and its consequences. On this occasion, the ideas of a Polish psychologist, Aleksandra Sobkowska will be presented in the context of the recent findings of New Psychology. Still in Chapter One, I will introduce Abraham Maslows psychological theory of the hierarchy of human needs. At the end of the same chapter, the author of the thesis will present the figure of Charles Dickens as a victim of the Victorian epochs Industrial Revolution, a victim of social injustice and economic deprivation, a victim of childhood i nterrupted. The Second Chapter will focus on the characterization of and the role of children in the Victorian society in the period of the Industrial Revolution. On that occasion, Oliver Twist, Dickenss portrayal of children in the historical and socio-economic context, will be discussed in detail and placed in the context of the Maslowian theory of the hierarchy of needs. In this chapter, the author will also ponder on Dickens involvement in the struggle against a childs exploitation; it is not clear whether in his books, the author aimed at evoking sympathy for the children and their plight, and thus he wrote mainly for the adult readership; or attempted to elucidate children on the causes of their unjust and despicable conditions. Chapter One Childrens needs and violence against children. The aim of the following chapter is to present the importance of needs in childrens psychological growth. In the course of Chapter One, the author of the thesis will refer to the foundations of Abraham Maslows theory of the hierarchy of needs. The author will also discuss different types of violence against children as the most detrimental element in a childs psychological development. Finally, Charles Dickens life will be placed in the context of the Victorian period. Childrens psychological needs Psychological needs of a human being are of great importance first and foremost for children, however, adults very often forget about it. Satisfying a childs material needs such as clothing, feeding, etc, they are convinced that they adequately fulfil their parental responsibility. In the light of modern psychology such an attitude is viewed critically. Though easily convinced that material goods are all they need, children become increasingly dissatisfied. Disturbing signals in our daily life children committing serious crimes, children becoming addicted to alcohol and drugs, adolescents dropping out of school; are all but proof of the existence of an area in a childs psyche that remains overlooked and neglected. Children differ significantly from one another; therefore, each child has to be treated separately whether it is by its parents or educators. Adults usually realize far too late how important they are for their childrens development, generally when their children start misbehaving and cause problems.  [2]  In order to prevent such a situation, it is necessary to study the mechanism of the needs formation; then consciously new and positive needs a need to discover, to know, to feel good about oneself can be created. As far as the mechanism of creating new needs is concerned, they are formed first through satisfying the needs that already exist. It is very important to offer children the opportunity to develop new and valuable needs, and rewarding responses of the environment have a great influence on childrens psychic growth. One of the main needs that are worth mentioning here is the need of emotional contact between a mother and a child. At the beginning, this contact has a more physical character, but in time, the character of this contact changes. It has a more psychological sense and needs another form of fulfilment.  [3]  Parents are able to create proper conditions to form a childs personality; to achieve this aim, parents must continuously observe and recognize their childs needs and try to understand them. Many factors have an influence on a harmonious course of a childs development, including all psychophysical processes, and affect the childs future stance point of view, and the way she or he is perceived by the society.  [4]   Human needs are divided into: material, biological, organic and psychological ones. Generally, psychological needs are additionally divided into: A need of safety shaped in ontogenesis A cognitive need An activity need A need of independence and personal development An emotional and social interaction need A sense of belonging and acceptance need A possession need b. Violence against children as the negation of proper development A child who is harmed is the one who is suffering due to improper behaviour of other people, mainly parents and guardians, and who experiences injustice and a sense of powerlessness. This process, whether intentional or unintentional, and resulting from adults actions, may have a negative influence on a childs physical or psychological development.  [5]   Dickens stories abound in episodes involving both psychological and physical abuse among children. Children rob one another of dignity and belongings. They accumulate anger and frustration in themselves. They are weak and dominated by adults and find abusing their equals or weaker ones as the only possible way of venting their anger. Violence against children leads unavoidably to violence in children. This too is a result of a childhood interrupted, of a thwarted development. Violence against children is the most perverted form of violence; children are defenceless and innocent human beings at a formative stage, who are susceptible to a physical and to psychological injury. Though violence may reside in children themselves, for example, in unwanted, problematic, chronically ill or disabled children; in the majority of cases, children are victims of violence perpetrated by adults. Violence occurs in many different circumstances, and may have different forms, but generally three groups of reasons for its occurrence may be distinguished: violence in children directed against others (children as well as adults) is a result of the childrens frustration with their own health (disabled and chronically ill children), with their social and indirectly economic status (orphaned children, children of alcoholics, etc.) and, importantly, often is a consequence of war; violence in parents directed at children which often is a result of social pathologies dysfunctional families; violence being a result of a familys social isolation owed to their religion, ethnicity, social or economic status, etc. According to Aleksandra Sobkowska, a Polish psychologist, there is a conventional division of violence against children based on its type: physical, psychological and sexual abuse. Negligence of children is sometimes considered to be the mildest form of violence, however, it is most common, and it is extremely harmful and just like any other form of psychical abuse beatings, torture, etc. extends its effects into the sphere of a childs psyche. Therefore, the distinction between physical and psychological abuse, at least in terms of their lasting effects psychical and psychological scars overlap and blur. In Sobkowskas view, psychical abuse of children has cognitive, emotional and behavioural consequences a childs abuse syndrome may be manifested by: a lack of a sense of security a lack of a sense of belonging to the closest people a lack of or low self-esteem spiritual loneliness a feeling of being harmed a feeling and consciousness of guilt and shame difficulty in forming relationships. In Charles Dickens novel Oliver Twist, there are many examples of child abuse and violence ranging from the very basic lack of alimentation: Unfortunately for the experimental philosophy of the female to whose protecting care Oliver Twist was delivered over, a similar result usually attended the operation of her system; for at the very moment when a child had contrived to exist upon the smallest possible portion of the weakest possible food, it did perversely happen in eight and half cases out of ten, either that it sickened from want and cold, or fell into another world, and there gathered to the fathers which it had never known in this.  [6]   through terrible living conditions; An unfinished coffin on black tressels, which stood in the middle of the shop, looked so gloomy and death-like that a cold tremble came over him, every time his eyes wandered in the direction of the dismal object: from which he almost expected to see some frightful form slowly rear its head, to drive him mad with terror. The recess beneath the counter in which his flock mattress was thrust, looked like a grave.  [7]   resulting in a sense of fear and spiritual loneliness: He was alone in a strange place; and we all know how chilled and desolate the best of us will sometimes feel in such a situation. The boy had no friends to care for, or to care for him. The regret of no recent separation was fresh in his mind; the absence of no loved and well-remembered face sank heavily into his heart.  [8]   Psychological violence is a conscious destruction or significant limitation on a childs possibility of proper development. Ranging from insults, as can be seen in the following episode from Oliver Twist: Get downstairs, little bag o bones. With this the undertakers wife opened a side door, and pushed Oliver down a steep flight of stairs into a stone cell, damp and dark, forming the ante-room to the coal-cellar, and denominated the kitchen.  [9]   It is hard to draw any conclusive ideas as to what future awaited Oliver, and whether his childhood filled with pain brought to bear on his life as an adult. There is a note to the preface of Charles Dickens Oliver Twist which say: It tells the story of an unfortunate orphan boy from his early years in the harsh environment of the workhouse, to his struggle for survival in the dangerous world outside its gates.  [10]   A parallel between the story of Oliver Twist, à ¢Ã¢â€š ¬Ã‚ ¦ a boy who dares to ask for more  [11]  and the life of Charles Dickens is evident. As a young boy, Dickens was forced to work in one of Britains infamous sweatshops, or as they were often referred to, children factories. His fathers debts put the whole family in prison; only young Charles was spared his freedom, however, in exchange for hard labour in a blacking workshop. In a way similar to most children from poor neighbourhoods of London, Dickens suffered pains of poverty hunger and all things most children his age would take for granted. Hunger haunted little Charles, something that is echoed in the story of Oliver Twist, but what pained him more was his hopelessness against the odds set by the cruel society of the 19th century Britain. Britain was undergoing a period of transformation; the Industrial Revolution was at its peak; many people fled the impoverished countryside and settled in big cities. There, they we re exploited by the capitalist industrialists. Slavery was by then outlawed in Britains overseas colonies, importing cheap labour was out of the question, yet the growing economy needed hands, many hands, inexpensive hands. In such circumstances, children became a commodity cheap and easy to manage. Factories soon filled with little children whose parents, all the while working themselves to near death, still failed to make ends meet. This is an era of Britains great economic expansion; this is an era that witnessed the birth of communism. Britain was getting rich, or at least the rich were getting richer; for the rest the society was falling apart. Many children faced a very bleak future; orphaned (mostly through abandonment); deprived of any possibility for social advancement, just like Oliver Twist, veered onto the dangerous path of crime. Dickens resisted the temptations of becoming a criminal; perhaps, in that sense, he was lucky; his contacts with Londons underworld remained luckily within the confines of his fantasy. I might easily have been, for any care that was taken of me, a little robber or a little vagabond  [12]  Dickens, a literary giant of the Victorian England, was first and foremost, its victim. As a child, he suffered all the deprivations shared by most of his books characters Nicholas Nickleby, Oliver Twist, Pip and David Copperfield; whose lives stories became a great testimony of Britains shameful past a past tainted by abuse against the innocent and the weakest children. c. Maslows hierarchy of needs This part of the thesis is based on the psychological theory authored by Abraham Maslow. Among other things, he wrote about human nature being good or at least neutral. It cannot be assumed that a child is born with a bad nature.  [13]  Because of its pessimistic, negative and restricted conception of human nature, Maslow became very critical of psychology. Unlike other scientists, he conducted his tests on healthy people, people without, for example, brain injuries; and he reached a number of new and innovative conclusions concerning personality. He claimed that psychology is much more occupied with peoples weaknesses rather than strengths; that the main focus of psychological studies is sin, and virtue tends to be omitted.  [14]   Maslows hierarchy of needs is represented by the following diagram: Maslow recognises, and illustrates his notion by means of a pyramid, that human needs can be divided into five levels, four of which represent deficiency needs (referred to also as basic needs) and are associated with human physiology. Only when those needs are satisfied, a human develops a need of self-actualization (referred to also as growth needs). d. Society in the Victorian Age Dickens hero, Oliver Twist, lived in a difficult time characterised by changes and the resulting serious crisis in the politics, economy and religious life. Victorians expected progress, rapid changes that were to improve their daily lives; apart from the elite, life in the nineteenth century was very hard for most of simple citizens, especially for children. Many peasants, driven away from the countryside by the prospects of better lives in the cities, fell victim of industrial exploitation and the capitalist system of economy. Cities grew in population too rapidly, forcing many to live in squalid neighbourhoods filled with filth and crime. Urbanization meant more places of work, but the cost of living in big cities often exceeded an average familys means. Families were large or too large; people lived in overcrowded houses in hand-to-mouth conditions. Industrial production was carried on at great risks and causing suffering of men, women and children. Britains status as the worksho p of the world was achieved at a great human cost  [15]  . People including small children worked fifteen or sixteen hours a day in, most of the time, unbearable conditions. The majority of people the so-called working class, which ironically included the unemployed, lived in the scruffiest of households. The industrialists treated the less fortunate, especially children, simply, and only, like objects, manpower. Children were exploited more than adults, because they never dared to ask for more. What is more, parents willingly agreed to this exploitation, even of very small children (often younger than six years of age), because they, too, could earn a few pennies. This extra income for starving families was at times a matter of life and death. Children employed in industry, suffered and often fell ill, at times irreversibly. Their childhood was taken away from them, but what is more, the precarious working and employment conditions, often forced them into the streets where they begged or stole to survive. Most children were denied the stability of having a home, being abandoned by their parents. Sometimes they were subjected to violence or solitude, being under-nourished or even starving, covered with rags, sleeping in empty cellars. Deprived of love and support from adults, they were neglected and lonely among others. The working class children had no rights and their hardship earned them no respect. People in Victorian England believed they were doing what was best for their children. But they were gripped by an idea which was widespread at that time that children were empty vessels, containing nothing worthwhile until filled with what adults judged best.  [16]   Dickens in his novels depicted the Victorian societys major problems. The writer portrayed the society in all its variety, touching all their problems but the theme to which he always returned, was the family, childhood, injustice, inequality, crime, corruption, scandals, poverty, as well as the suffering of children. Whatever he wrote was written with passion, because he experienced seeing life, from the point of view of the poor people and abused children. In his time, few people understood children as well as Dickens did, and he was the first writer who described childrens thoughts and feelings capturing the way they spoke, behaved, and suffered. Chapter two Childrens needs and violence against children based on Dickens novel Oliver Twist. The aim of the following chapter is to present the connection between a childs needs and life in the Victorian Age on the basis of Dickens novel Oliver Twist. Oliver Twist is the first novel in which Dickens speaks out against social injustice and an inadequate economic system that condoned the plight of the poorest, yet the largest, segment of British society. His, is not a portrait of a happy and harmonious family, but a debt-ridden, broken family where children, unless employed in Britains worst workshops, are viewed as a burden. The author tries to show terrible conditions in workhouses where poor people were forced to live and work if they could not pay their debts. In his novel Oliver Twist, Dickens also draws a critical picture of charitable foundations and their involvement in childrens orphanages. Additionally, Dickens sheds light on Londons dangerous criminal underworld. The main character of the novel, Oliver, is a neglected, illegitimate child. He does not know his father and his mother died at his birth. He is brought up as an orphan in cruel conditions in an orphanage typical of the Victorian Age. This small and lonely child is drawn into the world of brutality and violence. The fact that he does not have parents increased his loneliness and difficulties in life because he is deprived of their support which is very important, especially at the beginning of everyones life. Having a normal life is important for a child, but for Oliver that proved an unattainable dream. Oliver spends the first nine years of his life in a badly run home for young orphans and later he is transferred to a workhouse for adults. There, not only does he lack means to secure himself a decent upbringing, but is constantly short of the essentials such as sufficient amount of food, a room to sleep or clean clothes. When he is nine, he is still a child and he does not understa nd the world around him, especially his own status. Once, he asks an adult what it means to be an orphan: Boy, said the gentleman in the high chair, listen to me. You know you are an orphan, I suppose? Whats that, sir? inquired poor Oliver. The boy is a fool I thought he was, said the gentleman in a white waistcoat.  [17]   Oliver is afraid of adults; he does not understand why strangers decide about his future and his life, and in their presence he often trembles and cries. One of the most important and memorable images in the novel is the moment when Oliver feels extreme hunger and asks for something more to eat: Please, sir. I want some more.  [18]  This famous scene is symbolic in that sense that it expresses Olivers revolt against his situation. He does not understand that such behaviour is unacceptable in the workhouse and he is beaten as a result and then put up for sale, like an object, not a human being. Oliver acts against the rules because the situation in the workhouse is abnormal; his basic needs are not satisfied. The living conditions in the workhouses of the 19th century Britain were very severe and often these harbingers of modern day sweatshops resembled more prisons than houses. The treatment of children was terribly bad, some of them even starved to death. The sufferings of children in the Victorian Age indicate that their basic needs were not satisfied. The fundamental, basic needs which are essential for our survival, such as proper nourishment, a place to sleep, warmth were not met then. According to Maslow, food occupies the lowest level of the pyramid in the hierarchy of needs, and belongs to the very primitive group of needs, which are essential for survival; refusing proper nourishment to hungry people, especially children is the negation of humanity. What is more, Oliver Twist is denied safety and stability; he is an unloved and lonely child thrown into unsympathetic adult world, where he lacks parental love, affection and protection. In Maslowian theory, Oliver is denied access to the second developmental level and his need to feel safe remains unfulfilled. At the beginning, Oliver is not aware of his situation; gradually, however, he comes to realize his standing: I am a very little boy, sir; and it is so- so à ¢Ã¢â€š ¬Ã‚ ¦ So what? inquired Mr Bumble in amazement. So lonely, sir! So very lonely! Cried the child [à ¢Ã¢â€š ¬Ã‚ ¦].  [19]   This small boy feels he should have some rights as a human being and he seeks love. It is only natural for a boy like Oliver to look for love and a sense of belonging, a feeling that gives people a sense of stability. Again, the fundamental need, the third level of the Maslowian pyramid representing the hierarchy of needs necessary for a childs proper physiological and psychological development remains unfulfilled. Although he leaves the workhouse, his circumstances never improve; he moves in with Mr. Sowerberry, an undertaker. Subjected to moral and physical oppression, Oliver continues to feel lonely, cold and abandoned; in his new home he has no place to sleep: Then come with me, said Mrs Sowerberry, taking up a dim dirty lamp, and leading the way upstairs; your beds under the counter. You dont mind sleeping among the coffins, I suppose? But it doesnt much matter whether you do or dont, for you cant sleep anywhere else.  [20]   Another boy, named Noah Claypole, who too is a worker at Sowerberrys workshop, constantly abuses Oliver, but the main character endures his fate without a word of complaint. One day however, acting on an impulse, Oliver fights off Noahs attacks. He fights in defence of his mothers name but despite his innocence, Oliver is severely punished. This situation illustrates the Maslows notion of violence being a result of a thwarted development in an environment where a childs basic needs remain unfulfilled; violence and other forms of anti-social behaviour are a consequence. In other words, a child who is deprived of an opportunity to fulfil his needs uses aggression, turns to aggression; he/she does not act like a normal child. This moment in the novel marks another important transition; Oliver demands to be respected he reacts with violence against the insults used with regard to his mother an action that points to the fourth level of the Maslowian pyramid, the need of esteem. Oliver decides to escape because he refuses to endure his treatment. He chooses London hoping to change his life for better. In spite of being exhausted and hungry; he does not give up and is still full of hope and determined. He meets Dodger, who offers him a helping hand. Unaware, Oliver joins a gang of juvenile pick-pockets, run by a Jewish emigrant named Fagin. Dodger and other young boys, and now Oliver, roam the streets of London stealing, when they can, hanging out, laughing. Fagins gang creates an authentic society and provides these unwanted boys with security and a sense of belonging. Oliver has never known this kind of life; he is drawn to it to gain respect amongst peers, but also to feel accepted, relied on, and needed. At the beginning, Oliver does not realise that he has joined a criminal group. He does not understand the whole situation but tries to be a quick learner and to acquire new skills, i.e. pick pocketing. However, because he has little experience, or simply because he still is a naÃÆ' ¯ve little boy, he gets caught and arrested. Fortunately for Oliver, Mr. Brownlow, one of the gangs victims, recognizes the boys innocence, exonerates the boy during the investigation and takes him into his custody. Oliver leads now a better life, at last, but he is not sure if his benefactor will not one day send him back into the streets of London. He asks Mr. Brownlow: Oh, dont tell me you are going to send me away, sir, pray! [à ¢Ã¢â€š ¬Ã‚ ¦] Dont turn me out of doors to wander in the streets again. Let me stay here and be a servant. Dont send me back to the wretched place I came from. Have a mercy upon a poor boy, sir!  [21]   Mr. Brownlow, however, reassures the boy of his true devotion to his upbringing: My dear child, said the old gentleman, moved by the warmth of Olivers sudden appeal, you need not be afraid of my deserting you, à ¢Ã¢â€š ¬Ã‚ ¦Ã‚  [22\n\nNo comments:\n\nPost a Comment\n", "pred_label": "__label__1", "pred_score_pos": 0.7213267683982849} {"content": "Question: What Is The Role Of Mitochondria In ATP Generation?\n\nWhat is the role of mitochondria in generating ATP?\n\n\n\nIn ATP the energy is stored in the form of chemical bonds..\n\nWhat is ATP synthesis in mitochondria?\n\nMost of the adenosine triphosphate (ATP) synthesized during glucose metabolism is produced in the mitochondria through oxidative phosphorylation. This is a complex reaction powered by the proton gradient across the mitochondrial inner membrane, which is generated by mitochondrial respiration.\n\nWhat foods increase mitochondria?\n\n\nWhat is the cristae in the mitochondria?\n\nMitochondrial cristae are the folds within the inner mitochondrial membrane. These folds allow for increased surface area in which chemical reactions, such as the redox reactions, can take place.\n\nWhat vitamins help mitochondria?\n\nB vitamins and lipoic acid are essential in the tricarboxylic acid cycle, while selenium, α-tocopherol, Coenzyme Q10, caffeine, and melatonin are suggested to boost the electron transfer system function. Carnitine is essential for fatty acid beta-oxidation. Selenium is involved in mitochondrial biogenesis.\n\nHow can I heal my mitochondria?\n\n\nWhat are the two functions of mitochondria?\n\n\nWhat are the three functions of the mitochondria?\n\n\nWhat is the ATP cycle?\n\nThe energy-carrying part of an ATP molecule is the triphosphate “tail”. … In this way, ATP and ADP are constantly being recycled. Figure legend: The ATP-ADP Cycle. Energy is needed for the formation of ATP and is released as the ATP is converted back to ADP and phosphate.\n\nHow is ATP produced in a cell?\n\n\nWhat is the main source of ATP used for activating luciferin?\n\nLuciferin is activated by luciferase in an ATP-dependent step to form a luciferin-adenylyl intermediate; when oxygen is present this intermediate is rapidly converted to a peroxyluciferin product that decays to oxyluciferin with the emission of photons.\n\nDoes photosynthesis produce ATP?\n\nThe Light Reactions of Photosynthesis. Light is absorbed and the energy is used to drive electrons from water to generate NADPH and to drive protons across a membrane. These protons return through ATP synthase to make ATP.\n\nHow is ATP generated in mitochondria?\n\nAt the same time, the electron transport chain produces ATP. … At the inner mitochondrial membrane, a high energy electron is passed along an electron transport chain. The energy released pumps hydrogen out of the matrix space. The gradient created by this drives hydrogen back through the membrane, through ATP synthase.\n\nWhat are the steps of ATP synthesis?\n\nIn general, the main energy source for cellular metabolism is glucose, which is catabolized in the three subsequent processes—glycolysis, tricarboxylic acid cycle (TCA or Krebs cycle), and finally oxidative phosphorylation—to produce ATP.\n\nHow do you heal mitochondria naturally?\n\n\nWhat is mitochondria in simple words?\n\n\nHow does ATP synthase work?\n\nIn plants, energy acquired from photons is transferred through photosynthetic electron transport chain (ETC), which induces an electrochemical gradient to build up across the membrane. ATP synthase uses energy conferred by this electrochemical gradient for phosphorylation of ADP to generate ATP [7].\n\nHow many ATP synthases are in mitochondria?\n\nThere are 10 to 20 mitochondria in a cell; one ATP synthase complex generates 100 to 150 ATP molecules each second.\n\nWhat is the main function of mitochondria?\n\n\nWhat is needed for ATP synthesis?\n\nATP synthesis involves the transfer of electrons from the intermembrane space, through the inner membrane, back to the matrix. … The combination of the two components provides sufficient energy for ATP to be made by the multienzyme Complex V of the mitochondrion, more generally known as ATP synthase.\n\nWhere does synthesis of ATP in mitochondria takes place?\n\nThe overall process of creating energy in this fashion is termed oxidative phosphorylation. The same process takes place in the mitochondria, where ATP synthase is located in the inner mitochondrial membrane and the F1-part projects into the mitochondrial matrix.\n\nWhat are the two mechanisms of ATP synthesis?\n\nThe binding change mechanism and the torsional mechanism of energy transduction and ATP synthesis are two mechanisms that have been proposed in the literature.\n\nWhat is the movement of mitochondria in cell called?\n\nMotor-Based Mitochondrial Movement. Mitochondria primarily move by the action of molecular motors along cytoskeletal elements (Figure 2 and Table 1).\n\nHow is ADP converted to ATP?\n\nWhen one phosphate group is removed by breaking a phosphoanhydride bond in a process called hydrolysis, energy is released, and ATP is converted to adenosine diphosphate (ADP). … AMP can then be recycled into ADP or ATP by forming new phosphoanhydride bonds to store energy once again.", "pred_label": "__label__1", "pred_score_pos": 0.9996011257171631} {"content": "The U S Created Medicaid A Publically Funded Healthcare Program To Assist People\n\nThe U.S. created Medicaid, a publically funded healthcare program, to assist people in obtaining healthcare services. In this week, explore Medicaid and the Children’s Health Insurance Program (CHIP).\nAnswer the following questions:\n\nExplain the legislation that introduced Medicaid. Your explanation should include a description of the funding sources for the program.\nDescribe some of the changes, including CHIP, that have occurred to the Medicaid program since its inception.\nExplain the demographics of the majority of people covered by Medicaid and identify how many people in the U.S. are covered by Medicaid.\nDescribe the changes that will occur in Medicaid with the ACA.\n\nFrom the Internet, review the following:\n\nCenters for Medicare & Medicaid. (2017, September 14). CMS program history. Retrieved from\nCenters for Medicare & Medicaid. (n.d.). Affordable Care Act. Retrieved from\n\nSubmission Details:\n\nPresent your response in a 3- to 5-page Microsoft Word document formatted in APA style.\nOn a separate page, cite all sources using APA format.\n\n\nWhat Students Are Saying About Us\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.6809465885162354} {"content": "Beauty Store\n\nHema Beauty Store\n\n“What defines modern beauty?” was the starting point of a design investigation by selected design house Tjep., resulting in a unique cosmetics retail experience delivered through an inspirational in-store environment. Reviewing the new store in Amsterdam, Vogue stated “Don’t miss it, the very stylish HEMA Beauty, an experience as found at high-end international luxury brands.” and Red wrote “It’s like being in a luxury beauty shop, but then with extremely convenient and very affordable beauty products.”\n\nWhat defines modern beauty?\n\nColor and fashion are the foundation elements that tie the whole concept together visually and then a tremendous amount of effort went into creating the most optimal product browsing, categorization and information approach in close collaboration with the HEMA retail team. For HEMA, research had identified an increasing need for high quality makeup and skincare products, but at a more accessible price and provided in an inspiring environment. Creating this Tjep. focused on a strong expression of colors. We created a chromatic display, but played with the progression of the color spectrum – creating a space where it looks harmonious but is actually quite dynamic. Color defines beauty.\n\nColour defines beauty.\n\nNext Do break", "pred_label": "__label__1", "pred_score_pos": 0.8798189759254456} {"content": "Feng shui home analysis\n\nWhat is this all about?\n\nFeng shui is a method of arrangement that originated in China, dating back centuries.  The basis was the study of Qi or energy and how it moved or was affected the landscape. By understanding this, the most auspicious sites could be determined. There was a deep understanding of the importance of working with the natural order of things. \n\n\nBack then, this system was mainly for the elite, to ensure they were well protected and in position of power whereas now, we can apply this system in our every day lives and it is accessible to all.  Instead of studying surrounding mountains and water ways, we look to surrounding buildings and roads which create the modern day landscape.  In addition to the study of what surrounds a home, we can also assess how energy circulates within the home.  What is the quality of the energy and how do you interact or feel with it.  You often hear the expression \"good\" or \"bad\" feng shui.  While there may be some truth to that, essentially feng shui is all about the relationship between us and the things we surround ourselves in. \n\nThere is a common translation of Feng Shui that is Wind and Water. \n\n\nYou could say that the wind represents your mind, your thoughts, your psychology. \n\n\nWater could be said to represent your body, your physical being, your energy. \n\nIf we look at it that way, it becomes a very logical system!  How does your mind perceive the space, and what impact does that have on your body?  What signals are being sent to your nervous system?  This will create a somatic experience. \n\nNow, don't get me wrong, Feng Shui is also a complex art, with many layers, but in essence, this is why it is of interest and how making adjustments can create change.  The first form of communication is non verbal, or energetic, so we want to set an environment that interacts with us in supportive ways. \n\nWind and Water is also a representation of the concept of Yin and Yang, which plays a role in achieving balance in a space, as well as the five elements theory.  They both speak of the importance of transformation, or continual free flowing movement of energy.  When energy gets stuck, stagnation occurs. We can see this in a home as clutter for example, or in the body as pain, inflammation or illness.\n\nThe ways in which this impacts the space will all be clearly explained in the report along with the recommendations, with the goal of restoring balance, functionality and clarity. \n\nHow do I prepare?\n\nBefore our first meeting, I will be sending you some homework!   This questionnaire is kept confidential, and helps to fill in the picture as to what you have experienced while living in the space, and which areas you hope to experience a change.\n\nAt our first meeting, I will need to collect some information in order to complete my study, in addition to the measurements and observations I will be making.  Below is a list of some of the things you can expect. \n\n • An accurate floor plan.  This can be either the building plans or hand drawn, as long as it is to scale. Graph paper helps or online programs can be useful as well!\n\n • How long you have lived in the home\n\n • The birth dates of the people living there\n\n • Any major renovations and when?\n\n • Has anyone moved out since you are living there?\n\n • Any significant life events or changes?\n\n • Any challenges that you would like to discuss?\n\n • Any health concerns?\n\n • What your expectations or hopes are with this consultation.\n\nMember of the International Feng Shui Guild\nMember of l'association Canadienne des therapeutes en medecines douces", "pred_label": "__label__1", "pred_score_pos": 0.7523513436317444} {"content": "Make Language Learning Child’s Play\n\nMake Language Learning Child’s Play\n\nBy Japanese Gabby\n\n“Children are like sponges.” We’ve all heard it before. It’s more than a cliche at this point. Whether it be learning their mother tongue or learning what not to touch in the kitchen, kids seem to have a special ability that enables them to cut the proverbial line of hardship and frustration that anyone who has tried to learn a language is all too familiar with. But what is it about kids that makes them so good at picking up their language? Are they really better than us?\n\nWell, the short answer is, no. They’re not. But the methods they use for picking up a new language aren’t the same as adults’. Ever seen an infant trying to memorize animal names with flashcards? There’s a reason you haven’t.\n\nThe good news is a lot of these “techniques” are learnable strategies that can be implemented into your own language-learning adventure, placing you on a fast-track to fluency.\n\nThey’re not afraid of making mistakes.\n\nKids don’t get down on themselves if they say the wrong word or if they’re misunderstood. They learn from the experience and move on. That’s one of the major differences we see between child and adult learners–the older we get, the more we worry about perfection and how what we say is heard by others. Of course, this isn’t always a bad thing, but when it comes to making important progress in your language learning, especially when just starting out, it will only serve as a barrier. So stop worrying, grab a notebook, and make as many mistakes as possible–just try not to make the same one twice!\n\n\nThey start speaking from the get-go.\n\nChildren don’t waste time studying grammar rules and spelling when they’re learning their mother tongue–all of that comes later. Right off the bat, they’re making sounds, trying their best to mimic all of the chatter they come into contact with on a daily basis. And as soon as they start to see that what they’re saying is being received and understood by the people around them, it becomes almost impossible to shut them up. Now we’re not telling you to throw out your grammar book–you’ll need that, too. But the natural urge to study first and speak second is going the way of the paper dictionary. So quit waiting and start speaking! You might surprise yourself.\n\n\nThey don’t learn hand-picked words from a textbook.\n\nKids have the advantage of getting to hear real language spoken by native speakers in a variety of contexts. They’re constantly bombarded with language about everything around them: people, animals, toys, TV shows, music, buildings, vehicles, etc. To put it simply, kids are immersed in their target language. Everything they do is in their target language. Their feelings, their schoolwork, their interests. One of the best ways for adults to adapt this to their own studies is to find a hobby and learn about it in their target language. If you love watching soccer, catch up on the latest news in Spanish. If your dream is to travel to Tokyo, check out a travel blog written in Japanese by a local. YouTube is a great place to find videos about any topic in any language–you’ll find both educational and entertaining videos made for language learners as well as for actual speakers of the language. It doesn’t get any easier than that!\n\n\nThey don’t learn grammar, they learn patterns.\n\n By mimicking those around them, and focusing more on what to say as opposed to why it’s said, children quickly become adept at picking up on language patterns. And since grammar is the systematic organization of a language’s patterns, when it comes time to communicate an idea that they haven’t heard used before, kids draw on the patterns in their mental database to think of how to express it. The process is entirely unconscious for kids since they navigate a demanding environment daily in their target language. So unless we have a similar, immersive environment to push us, most adults will need to take a more conscious approach. That means being aware of what sentences you encounter along with your studies. When you hear something new that catches your ear, write it down and make a point to use it again in a slightly modified way. Change the object, say it in the past tense, anything you can do to change it will help you start to cement the pattern in your brain. A daily journal is a perfect way to do this.\n\n\n\nThe process of picking up a new language is anything but glamorous–your journey is certain to be one full of bumps, hiccups, misunderstandings, and (hopefully only mild) embarrassments. But by taking a more proactive approach, learning from the little geniuses around you, and creating as many opportunities to practice as possible, you’ll find yourself on the path to polyglotism in no time! Just don’t forget to enjoy the ride–after all, that’s what being a kid’s all about.", "pred_label": "__label__1", "pred_score_pos": 0.8196539878845215} {"content": "• Kyodo\n\n\nAn ecumenical group of religious leaders from Hiroshima and Nagasaki met with Pope Benedict XVI on Wednesday during a visit to Vatican City to commemorate the 60th anniversary of the Hiroshima and Nagasaki atomic bombings.\n\nThe meeting with the 30-member group took place during one of the pope’s audiences Wednesday with the general public.\n\nTen years ago, during the 50th anniversary of the atomic bombings, religious representatives from the two cities paid a visit to the late Pope John Paul II.\n\nRepresenting the group, Mitsuaki Takami, archbishop of the Catholic Archdiocese of Nagasaki, told the pope that the religious leaders, regardless of their affiliations, have been praying together for the abolition of nuclear weapons.\n\nAfter being presented with letters from the mayors of Hiroshima and Nagasaki, the pope said he was happy to meet with people who promote interfaith dialogue.\n\nThe group consists of 25 people from Nagasaki, including Chitoshi Noshita, a Catholic priest, and five others from a religious federation in Hiroshima Prefecture, including Gene Nakagawa, a monk from the Buddhist Jodo Shinshu sect.\n\nBefore heading home, the group is also scheduled to visit the town of Assisi, a religious center for interchurch dialogue.\n\nBy subscribing, you can help us get the story right.", "pred_label": "__label__1", "pred_score_pos": 0.5318702459335327} {"content": "5 things you must do when selling or merging your legal practice\n\nBy Rohan Harris|04 April 2017\nRohan Harris\n\n\"Looking to sell or merge your legal practice?\" asks Rohan Harris.\n\nDon’t let those years of hard work go to waste. Get maximum return on your investment by getting your practice ready for sale or merger.\n\n1. Have your elevator speech prepared\n\nWhile you must keep your plans low key, there will still be people you need to tell. Can you convince your partners and financiers in 20 seconds or less that a sale or merger is the right thing to do? You need to have compelling answers at the ready because you are about to invest significant time, money and effort in this process.\n\n\nThose around you need to be convinced that this investment is worthwhile, particularly as the sale or merger may take you away from your fee-earning activities.\n\nYou need to be a strong and trustworthy leader of this process.\n\n2. Think outside the square\n\nWhen considering who you are going to market your practice to, don’t go too narrow. It may be that your merger partner or acquirer wants an established office in a strategic location that they don’t currently service, or you may be able to offer a desirable client panel appointment that they don’t have. A potential buyer or merger partner might operate primarily in another industry, but be looking to diversify.\n\nDon’t rule out buyers or merger partners who offer different services to your practice. Revenue might not be the only attraction of your practice. Your key client relationships, intellectual property and high-performing employees may also add value in the eyes of prospective buyers or merger partners. Do your research and think laterally.\n\n\n3. Freshen things up \n\nThere are many small things you can do to make your practice more attractive. Tidy up your practice premises for potential buyers or merger partners to walk through. A good spruce up before you put it on the market will improve your sale or merger options.\n\nMake sure your financials are also in order. Collect or write off debts and resolve outstanding disputes and legal claims. Check that your practice registrations are current, and that all financial, customer and employee records are in order. Pull back on any unnecessary expenditure.\n\n4. Keep it under wraps\n\nConfidentiality is crucial both in your dealings with interested parties, but also within your practice. Have some lines prepared to use if you get unexpected questions about a proposed sale or merger. These questions could come at any time, so be prepared.\n\nIt can be wise to use a third party, like a practice broker, to handle inquiries and pre-screen potential buyers. Only provide more specific information about your practice to parties who have signed a non-disclosure agreement and have undergone a pre-qualification process. You should keep the most sensitive information under wraps for as long as possible, and only disclose it when terms of sale or merger have been agreed upon.\n\nWithin your practice, minimise the number of people who know about the deal by using a private email address for communications with your advisors. A good rule of thumb for personnel in your organisation is to operate on a strict ‘need to know’ basis. Leaks within your organisation can be very destabilising for employees and can prompt them to leave. They can also cause uncertainty among your clients.\n\n5. Seal the deal\n\nDon’t rely on a handshake, memorandum of understanding or heads of agreement. If things go wrong, failure to have a legally enforceable contract can be disastrous. Don’t forget to include default and termination procedures in the contract. Avoid ‘agreements to agree’ where further negotiation can be used by buyers or merger partners who may change their mind and decide not to proceed.\n\nIn short, it is well worth engaging an experienced lawyer to negotiate and document your deal. Your lawyer should also assist you to devise a detailed list of tasks to complete, following the signing but before the sale or merger is complete.\n\nRohan Harris is a professional services and business lawyer and principal at Russell Kennedy Lawyers.\n\n5 things you must do when selling or merging your legal practice\nIntro image\nlawyersweekly logo\n\n\nWhat’s the secret to successful networking?\n\nWhat’s the secret to successful networking?\n\nChampions of Pride launches\n\nJohn Walker\n\nClayton Utz and ICP begin business interruption insurance class action\n\nNSW government to develop health and innovation campus\n\nNSW government to develop health and innovation campus  \n\nRecommended by Spike Native Network", "pred_label": "__label__1", "pred_score_pos": 0.7363804578781128} {"content": "In the current manufacturing set-up, a lot of companies are offering additive manufacturing processes which can be quite overwhelming especially if you are a beginner. Using the right 3D printing service that will cater to all of your production needs and preference is very important.\n\nNow, the all-important question becomes; How do you choose the right 3D printing service? Which criteria should you use and take into account? In this post, we are going to delve in a little bit deeper and choose which is the best option for you and provide you with excellent tips.\n\nWhy do you need to choose a 3D printing service?\n\nFirst, we will tackle what is 3D printing service and why you need to choose one. For those who want to use 3D printing, you have two options; you can purchase a 3D printer or use a 3D printing service to create your parts and products.\n\nThe second option is the most affordable and economic one, let look at it this way. Purchase a whole 3D printing machine such as Direct Metal Laser, Selective Laser Sintering 3D printers (or SLS 3D printers), and Sintering 3D printers (DMLS 3D printers) to create excellent parts and products is actually quite expensive. On the other hand, desktop 3D printers using Fused Deposition Modeling is not necessarily the best option as it’s not flexible to accommodate all of your design needs. \n\nSo, when it comes to choosing the best 3D printing service, you need to go with the one that it’s the right fit for you and the one you are comfortable working with. Here are some of the selection criteria that you should take into account before making the final decision.\n\nTechnology and material available\n\nEvery printing material have their own traits and properties, for some they might be excellent for mechanical properties but for others, they are best for artistic and design purposes. Having multiple choices will enable you to print parts/products that cater to and matches all of your needs.\n\nAlways go with the material that is cost-effective making the whole production process economical and affordable. Additionally, you also want to use a specific 3D printing material, like for instance for jewelers; you need to go with a printing service that has a wide range of precious metals.\n\n3D printed chairs\n\n3D printed chairs*\n\nDesign assistance\n\nUsing a 3D printing service is actually quite simple and straightforward, but here are some few things that you should know. For 3D orienting to be done, you need a 3D model of the object you want to be printed. A 3D model basically is a three-dimensional representation of a part or product created using 3D modeling software. \n\nUsing these programs can be quite hard at first, but to make things easier some 3D modeling programs offer training and services assisting you to get a high-quality 3D model for your project.\n\nThere are also some 3D printing services that provide you with tools allowing you to optimize your design without help from 3D professional designers. By doing this, you’ll be not only reducing the overall manufacturing cost but also improving the quality of your 3D printed parts.\n\n\n\n*Image from", "pred_label": "__label__1", "pred_score_pos": 0.9943291544914246} {"content": "Researchers from the Massachusetts Institute of Technology say they have discovered clues as to why a malaria-related parasite, called toxoplasma gondii, can cause blindness in some people but not in others. This is according to a study published in PLOS Pathogens.\n\nToxoplasma gondii is a single-celled parasite that causes a disease known as toxoplasmosis.\n\nSome people with toxoplasmosis can develop encephalitis – a swelling of the brain – or ocular toxoplasmosis – a condition that can lead to blindness.\n\nToxoplasmosis can be contracted a number of ways. Eating undercooked or contaminated meat can lead to infection, as well as consuming water contaminated with the parasite.\n\nCat feces can also contain toxoplasma gondii, so coming into contact with this while cleaning a litter tray or touching soil that has been contaminated with the feces may lead to infection.\n\nAccording to the Centers for Disease Control and Prevention (CDC), more than 60 million people in the US may be infected with the parasite. But many may not know they are infected, as the human immune system is normally strong enough to stave it off.\n\nHowever, those with weakened immune systems or pregnant women can experience serious health problems from the infection.\n\nThe investigators explain that strains of the toxoplasma gondii parasite that are found in North America and Europe are different from strains found in South America – which appear to cause more severe symptoms regardless of a person’s immune system strength.\n\nTo find out why, the researchers infected mouse immune cells – known as macrophages – with 29 different strains of the toxoplasma gondii parasite.\n\nThe researchers explain that macrophages are a major target of the parasite, and they also play an important role in the immune response of the host.\n\nAfter the immune cells were infected, the researchers sequenced all of the cells’ messenger RNA molecules, in order to find out which genes – both in the parasite and the host’s immune cells – are activated the most during infection.\n\nFrom this, the investigators found that some South American and atypical North American strains of the parasite had a type 1 interferon response. This is an immune reaction that usually occurs during viral infection.\n\nThis response prompts a strong inflammation reaction in the host’s immune cells, which the researchers believe could be the cause of the severe effects that these strains produce.\n\nThe researchers say that the parasite triggers this immune response once it has been killed by the host cell, meaning that parasite’s DNA and RNA leaks into the host cells.\n\nExplaining this further, Jeroen Saeij, biologist at the Massachusetts Institute of Technology (MIT) and study author, says:\n\n\n\nAccording to the researchers, toxoplasma gondii is one of very few parasites that are able to infect any warm-blooded animal. They say any parasite that can do this needs to have a large array of molecules that are able to work within any host or cell.\n\n“However, we believe that different strains may have evolved to be able to maintain and reproduce optimally in a specific niche in nature, which may explain why different strains of toxoplasma have such varying effects in different organism,” says Mariane Melo, of MIT and lead author of the study.\n\nFor example, she explains that if a strain found in rats has adapted to that environment and stayed in that host a long time, then this could cause a fatal infection in mice, or the other way around, because “it might modulate host immune responses too much or not enough in hosts it is not optimally adapted to.”\n\nThe investigators say that further research will look to determine why specific South American strains of the toxoplasma gondii parasite are able to be so effectively killed by the host cells, and why this triggers the type 1 interferon response.\n\nFurthermore, the research team has put all their data into a publically available database in the hope that other researchers will start to study the parasites.\n\nLate last year, Medical News Today reported on a study detailing what toxoplasmosis does once it reaches the brain.", "pred_label": "__label__1", "pred_score_pos": 0.9968186020851135} {"content": "In our last post, we began speaking about the potential impact of inclement weather on determinations of negligence in car accident litigation. As we noted, a finding of liability for a party who causes a gets involved in an accident in inclement weather, but the extent of that person’s liability can certainly be modified both by the weather and the negligence of other drivers.\n\nLast month’s debacle on the Pennsylvania Turnpike highlights that there may be instances where drivers have other parties to blame when inclement weather causes problems on the roadway. As a result of a serious blizzard snowstorm, over 500 vehicles were stranded for nearly 24 hours on a 16-mile stretch of the turnpike. The problems started when two tractor-trailers lost functioning and ended up blocking the lanes. Part of the problem, though, was that weather predictions were seriously inaccurate.\n\nAccording to a spokesperson for the Pennsylvania Turnpike Commission, the agency counted on a forecast of about eight inches of snow. That prediction was given on January 22, around mid-afternoon. The next update, according to the agency, didn’t come until 10 p.m., when the prediction is said to have changed to a foot or two. Lawmakers have pointed out, though, that local news stations were updating predictions throughout the day.\n\nIt isn’t clear what consequences, if any, the agency will face as a result of the debacle. Typically, suing a government agency for personal injury liability is a challenging prospect due to legal immunity issues. It is worth pointing out, though, that those involved in any car accident–not only accidents where inclement weather is involved–should work with an experienced attorney to ensure they explore all possible avenues for liability and compensation.", "pred_label": "__label__1", "pred_score_pos": 0.9902432560920715} {"content": "Video encyclopedia\n\nSelection shadow\n\n\nWhat is SELECTION SHADOW? What does SELECTION SHADOW mean? SELECTION SHADOW meaning & explanation\n\n\nSelect - Shadow the Hedgehog [OST]\n\n\nTrove Store Pack Showcase : 2020's Shadowy Selection (Shadow's Eve 2020)\n\n\nSkyline TerraExplorer v6.5 Shadow Effect, Selection Shadow and Shadow Query\n\n\n[Wikipedia] Selection shadow\n\nThe selection shadow is a concept involved with the evolutionary theories of ageing that states that selection pressures on an individual decrease as an individual ages and passes sexual maturity, resulting in a \"shadow\" of time where selective fitness is not considered. Over generations, this results in maladaptive mutations that accumulate later in life due to aging being non-adaptive toward reproductive fitness. The concept was first worked out by J. B. S. Haldane and Peter Medawar in the 1940s, with Medawar creating the first graphical model.", "pred_label": "__label__1", "pred_score_pos": 0.6107145547866821} {"content": "Spectroscopy Since 1975\n\nThe kilo, the mole and the commutability of a result to activity\n\n\nPeter J. Jenks, FRSC\n\nThe Jenks Partnership\n\nFor all of my scientific life, weight has been traceable to a lump of platinum alloy sitting under a series of glass belljars and located in Paris, France. In my early days, amount of substance was expressed as mg L–1 or ppm, in many labs these units are still commonly found. In 1971 the Mole was made the seventh SI base unit and slowly the idea of molar solutions permeated analytical chemistry.\n\nNow, all that is set to change because on 16 November this year the 26th General Conference on Weights and Measures (CGPM) voted unanimously in favour of revised definitions of the SI base units, a change that the International Committee for Weights and Measures (CIPM) had proposed earlier in the year. The new definitions will come into force on 20 May 2019.\n\nAs a direct consequence the kilogram, ampere, kelvin and mole will then be defined by setting exact numerical values for the Planck constant (h), the elementary electric charge (e), the Boltzmann constant (k) and the Avogadro constant (NA), respectively. This brings them into line with the metre and candela, which are already defined by physical constants, subject to correction to their present definitions and does not change the size of any units, so maintaining continuity with existing measurements.\n\nThe changes\n\nThe kilogram, symbol kg (lower case) is the unit of mass: the previous definition is that it was equal to the mass of the international prototype of the kilogram.\n\n • 2019 definition: The kilogram is now defined by taking the fixed numerical value of the Planck constant h to be 6.62607015 × 10­34 when expressed in the unit J·s, which is equal to kg·m2·s­–1, where the metre and the second are defined in terms of c and ΔνCs.\n\nA consequence of this change is that the new definition of the kilogram is dependent on the definitions of the second and the metre. A second consequence is that a new definition for the mole is required.\n\nThe mole, symbol mol, is the SI unit for amount of substance. The previous definition was that it is the amount of substance of a system that contains as many elementary entities as there are atoms in 0.012 kg of carbon-12. When the mole is used, the elementary entities must be specified and may be atoms, molecules, ions, electrons, other particles or specified groups of such particles.\n\n • 2019 definition: One mole contains exactly 6.02214076 × 1023 elementary entities. This number is the fixed numerical value of the Avogadro constant, NA, when expressed in the unit mol­–1 and is called the Avogadro number.\n\nA further consequence of these changes is that the current defined relationship between the mass of the 12C atom, the dalton, the kilogram and the Avogadro number will no longer be valid.\n\nAs the wording of the ninth SI Brochure1 implies, the mass of a 12C atom is exactly 12 dalton then the number of daltons in a gram cannot any longer be the numerical value of the Avogadro number: (i.e., g/Da = NA·mol).\n\nThese changes are all very interesting at the academic level, but what do they mean to chemical metrology and the use of reference materials? In truth very little, as they are designed to ensure continuity with all existing measurements that in turn underpin the certified values of the CRMs.\n\nA far greater concern is the issue of commutability, a subject I have touched on in the past. It was the laboratory medicine community who first expressed concern about the commutability of data, but with the move to accredit medical diagnostic laboratories to ISO/IEC 17025 the concept has migrated into the world of general analytical chemistry. Why is commutability so important?\n\nMaintaining accurate laboratory measurements over time is crucial to making data comparable. This is generally achieved by the use of an accredited quality system, typically ISO/IEC 17025, and establishing traceability to a reference system, the SI. Reference materials are key components of such reference systems and for establishing traceability this means that commutability of reference materials is a critical property to ensure they are fit for use.\n\nCommutability is defined as the equivalence of the mathematical relationships between the results of different measurement procedures for a reference material and for representative samples taken from the area to be analysed. This material characteristic is of special importance for measurement procedures that are optimised for measuring analytes directly in real-world samples. It becomes even more important when the reference material is certified for some aspect of biological quantity and not an amount of substance.\n\nFor example, how do we produce reference materials for use in DNA measurements? The measurement of specific DNA fragments to demonstrate the presence, or absence, of a biological entity has become a key part of food quality measurement and is creeping into microbiology, food, environmental and clinical. Many will recall the 2014 adulteration of beef with horse meat. As a direct consequence, LGC developed new reference materials to underpin the detection of alien species within a defined processed meat. The materials were analysed using three different approaches—DNA sequencing, a PCR-based method and an immunoassay method—to confirm the expected meat species in the samples and the absence of possible species cross-contamination. The limit of detection is below 1 % of one meat species in the presence of another. The Reference Materials were produced by weighing out previously verified pure meat and mixing them in the defined proportion. No subsequent analysis was made. When using Sanger sequencing it is common to use mitochondrial genes, for example MT-RNR1 which encodes RNA 12s and MT-CYB which encodes cytochrome b. Ultimately the identity of the genes is validated against known DNA Sequence Databases.\n\nIt seems to me that traceability to a proprietary sequence database is a long way away from traceability to the SI and that the new definitions for amount of substance mean little in this context. The question remains unanswered, just how can traceability and commutability be maintained when an assay of a complex biological material is validated by comparing a sequence with data on a database, most probably supplied by the instrument maker?\n\n\n 1. Draft of the Ninth SI Brochure. BIPM (5 February 2018). https://www.bipm.org/utils/en/pdf/si-revised-brochure/Draft-SI-Brochure-2018.pdf [accessed 22 November 2018]\nRate this Article: \nNo votes yet", "pred_label": "__label__1", "pred_score_pos": 0.8849457502365112} {"content": "We're celebrating a new year and new skills, by offering a 21% discount off all courses and collections at checkout! ✨\n\nHow to Explain What You Really Do, Graphic Designer Edition\n\n\nNovember 18th 2020\n\n\nNika Simovich Fisher\n\n\nFonzy Nils\n\nIn many social situations, you're bound to run into the inevitable, \"So what do you do?\" question. Usually, \"I run a small design and development studio, and I teach about design,\" is sufficient. Still, it will sometimes pose enough curiosity that the earnest question-asker will continue, \"What kind of design?\" which eventually leads to the pinnacle of tricky questions, \"What is graphic design?\"\n\nMy least favorite aspect of being a graphic designer is explaining what I do to non-designers.\n\nIt's a valid question, too. You can't expect everyone to understand your line of work, and a big part of being a designer is being a successful communicator, so what's the problem?\n\nThe frustration comes from the fact that there isn't a short answer, and there are some misconceptions around design at large that are important to address to provide an honest and informational response.\n\nI'll begin to explain what graphic design is through three common questions and comments.\n\n\"So, do you make logos?\"\n\nThis question is usually accompanied by an eager-eyed stare from someone ready to describe their new business idea in great detail.\n\nYes, sometimes graphic designers make logos, but it's important to note that a logo is an execution and part of a bigger story – a brand. The way this question is framed implies that a designer would simply draw up a logo from their imagination and call it a day.\n\nDesigners differ from illustrators because their work is usually not a one-off asset. Typically, the design is part of an overarching narrative that fits into a broader context – whether it's a brand, an article, or a website. In the logo's case, the logo is part of a brand story, a system of typography, colors, and visual motifs that then become realized across both printed and digital assets. The research process, project development, typography, graphic elements, and visual design principles (color, alignment, texture, rhythm, hierarchy) unite them under the same umbrella.\n\nSome designers may choose to specialize in one type of design, such as: product design, branding, exhibition design, or motion graphics. While these types of jobs vary in the end result, they share a similar process and are all fundamentally graphic design.\n\nThis can be confusing because a website and a tote bag might look very different from one another. Still, for both, a designer had to carefully think about the contents of each, research a visual strategy, evaluate how it will be used, and develop the design components that will work within that context.\n\nMost design pieces go through a planning phase, an experimental phase where variations are explored, and then a testing phase where the design is evaluated and improved upon. Good designers will continue refining their work and making changes once they can interact with it in a finalized setting.\n\n\"You must be a photoshop wizard!\"\n\nThis statement is usually excitedly shared when someone has discovered your skillset and is about to ask you to work on a flyer for their upcoming yard sale.\n\nIt's not an incorrect statement. Designers have a strong understanding of the trade's professional tools, but it's essential to recognize that tools do not define the profession. You're still a designer, whether you're designing with chalk or with photoshop.\n\nIn a recent class I taught, I asked my students to create a series of posters using free, online tools like glitter text generators, 3d rendering makers, and online drawing programs.\n\nWhile using these tools had some obvious challenges, the students could still create a cohesive and engaging poster series. The students first developed a strong idea for their work and experimented with the tools. They embraced the limitations of the programs and found ways to create unifying design treatments. Even using this unexpected method of image-making, It was apparent that a designer had created the posters because there was a sense of control and intentionality.\n\nHaving a clear objective and developing a methodology to communicate defines a designer, much more than the tool itself. Intentionality is everything.\n\n\"It must be fun making things pretty all day.\"\n\nThis comment is frequently delivered by someone who doesn't know what else to say. While well-intentioned, this comment feels the most reductive and misleading about what a graphic designer does.\n\n\"Pretty\" is wildly subjective and too ambiguous. People who share this comment usually mean that you're successful at polishing other people's content off and making minutia changes to make it ready for a broader audience to purchase it.\n\nThis is not totally off-kilter, but it bothers me for two reasons: first, it diminishes the process and strategy that gets invested into a project by reducing it to arbitrary choices based on aesthetics; and second, it implies that a designer is always working on other people's content and not their own, with the primary intention of making it marketable.\n\nDesign starts with research, continues into planning, extends into experimentation, and ends with something that starts to feel complete. Critical thinking, being resourceful, and an ability to break down a project into a series of steps will take you a lot further than merely having an eye for design. Strong visual sensibilities are essential to the profession, too, but without a process and a plan, the skillset gets lost. It's the difference between being a graphic designer and simply an extra set of hands.\n\nIf it isn't apparent by now, graphic designers have a varied skillset that feels much more like a framework or philosophy than a job title. For this reason, designers are successful at developing a visual representation of an idea and the idea itself.\n\nMany designers are excellent strategists, copywriters, and art directors because they can communicate through a variety of content and create a common theme throughout all of these executions.\n\nSelecting who to work with, what order items will be positioned in, what kind of message should be emphasized, and researching photographers are all \"invisible design choices\" that significantly impact a project. For the sake of efficiency, it can be best to collaborate with a team, but never underestimate what one individual is capable of doing.\n\nAnything can be graphic design. We frequently associate it with consumer-based products because that's where many people experience it first hand, but it's not confined to something that can sell products. The design process can help you be a better communicator and perhaps teach others something new. Design can also be used for personal expression, self-publishing, or providing information to an audience that might not access it. The possibilities are endless.\n\nSo, as you can see, describing what a designer does can be a little lengthy and leave the inquirer feeling like they got more than what they asked for. Next time you get asked this, be prepared to sit down and chat for a while!\n\nAbout the author\n\nNika Simovich Fisher is a multi-disciplinary graphic designer, educator, and writer based in New York. She is currently a partner at Labud, a design and development studio she founded in 2018 and teaching at Parsons School of Design and the University of Pennsylvania.\n\n\nNovember 18th 2020\n\n\nNika Simovich Fisher\n\n\nFonzy Nils\n", "pred_label": "__label__1", "pred_score_pos": 0.9485774636268616} {"content": "You are here\n\nThe Best and Worst Countries for Environmental Democracy\n\n\nThese three fundamental rights are known as environmental democracy—and not all nations provide it to their citizens.\n\nThe new Environmental Democracy Index (EDI) is the first-ever online platform that tracks and scores 70 countries’ progress in enacting national laws that promote transparency, accountability and citizen engagement in environmental decision-making. The analysis, based on 75 indicators, identifies the best and worst countries for environmental democracy. The results may surprise you.\n\nThe Top Countries with Strong National Laws for Environmental Democracy\n\nThe top three countries are all former Soviet states—Lithuania, Latvia and Russia. Many of their relevant national laws were enacted as part of democratization reforms in the 1990s and the United Nations Economic Commission for Europe’s (UNECE) legally binding Aarhus Convention on access to information, public participation and access to justice in environmental matters. Lithuania and Latvia have both ratified this convention and strengthened their legislation after doing so, such as Lithuania’s amendments to its Law on Environmental Protection and Latvia’s passage of its Environmental Protection Law.\n\nRussia in particular may stand out to some as surprising, especially in light of several environmental activists recently fleeing the country out of fear for their freedom and safety. Therein lies a powerful lesson: Countries’ national laws may be quite progressive on paper, but the enforcement of those laws is oftentimes weak or subject to corruption.\n\nAll of the top 10 performers have statutes to support the public’s right to access government-held environmental information such as forestry management plans or mining permits, and all of them require at least a majority of government agencies to place environmental information like air and drinking water quality information in the public domain. While public participation scored the lowest across the index, all of the top 10 countries provide the public with the right to participate in major, national environmental decisions, such as infrastructure projects, forest management planning, pollution permitting and more. Lithuania stands out for having the highest score on the justice pillar. Its Civil Procedure Code and Law on Environmental Protection provides for communities to bring environmental cases in the public interest.\n\nWhat’s also interesting about the top 10 performers is that wealth is not necessarily the defining factor of strong environmental democracy laws. Panama and Colombia are resource-strapped nations, and South Africa is an upper middle income country; nevertheless, they’ve committed to enacting strong environmental laws.\n\nThe Lowest-Scoring Countries for Environmental Democracy\n\nHaiti, Malaysia and Namibia scored lowest on the index. Of the bottom 10 countries, some had right-to-information laws, but most lacked provisions requiring that government agencies proactively make environmental information public. In countries like Philippines, Republic of Congo and Pakistan, citizens need to go through time-consuming or expensive information requests to obtain crucial information like statistics on air or drinking water quality. The government may or may not honor these formal requests.\n\nMany of the bottom performers also lacked requirements on collecting environmental information and monitoring compliance. National governments in Ethiopia, Nicaragua, Guatemala, Bangladesh and Thailand do not actually ensure that factories, mines and other facilities aren’t harming people or the planet. And requirements for public participation in these countries are almost always limited to environmental impact assessments, leaving out other important decisions such as the development of forest management plans, protected area policies or environmental protection laws.\n\nOne positive note is that even at the bottom of the list, Saint Lucia, Nepal, Sri Lanka and the Republic of Congo allow an individual to file lawsuits in the public interest. Otherwise, the right to challenge or appeal government or private sector decisions is not as well established in these countries.\n\nThere’s Room for Improvement Across the Board\n\nEven in countries that scored relatively well, there’s still room for improvement. Almost 50 percent of the countries assessed, for instance, are not making real-time air quality data available online for their capital cities. And while nearly half of the countries require agencies to monitor environmental compliance, 64 percent of those with laws on the books do not release any information to the public on emissions or wastewater discharges, pollutants that can impact human health and the environment.\n\nAnd even if countries have strong laws on the books, it doesn’t mean that they are adequately enforced. EDI measured countries based on the existence of national laws, not implementation. However, supplemental to the legal index, EDI includes 24 indicators on environmental democracy in practice. These indicators are not comprehensive, but they do provide some key insights to allow some comparison with legal scores.\n\nNational laws aren’t the only way to improve environmental democracy, but they’re an important first step. EDI can help governments who want to promote transparent, inclusive and accountable environmental decision-making by providing an index to benchmark progress, as well as examples of good practices from around the world. It’s time to give citizens a voice—for the good of the planet, and for the good of communities around the world.\n\nStay Connected", "pred_label": "__label__1", "pred_score_pos": 0.9678980112075806} {"content": "Any investor should have an idea of what they want to see from their money. It is no good putting your savings somewhere and simply hoping for the best. You must have a plan for them.\n\nWhat is your investment goal?\n\nPart of that plan is having an expected return. The goal with any good investment should be that at the end of it your money is worth more than when you started. That means that it needs to grow faster than the rate of inflation. This is something that unfortunately many investors overlook. Your wealth is actually only increasing if it is growing faster than your cost of living.\n\nInflation calculations\n\nAt the recent launch of its annual Long-Term Perspectives outlook, the Old Mutual MacroSolutions boutique illustrated just how inflation erodes your buying power. If inflation is at 6% a year, R10,000 today would be worth the equivalent of just R5,558 in 10 years. In 20 years, it would only be worth R3,118. That is why it is critical that you don’t just try to preserve your capital over the long term, but invest in growth assets such as equities and listed property to ensure that your wealth actually increases in real terms.\n\nReturns above inflation\n\nSince 1929 South African equities have delivered annualised real returns – that is returns above inflation – of 7,5%. Conversely, local cash investments have only produced real returns of 0,6%. Put another way, if you had invested in the stock market over this period you would have doubled your real investment value every nine years. To do the same in cash would have taken you 92 years. The trick, however, is that equities are not always the best investment from one year to the next, and cash isn’t always the worst. Sometimes their positions are entirely reversed.\n\nHaving a well-diversified portfolio in these times means that you will be spreading your risk while also getting returns from different places. That gives you peace of mind that you have some protection in place, and that you are likely to still outperform inflation over the long run.\n\n\n\nJoin Us!\n\nSign up for the Your Neighbourhood newsletter!", "pred_label": "__label__1", "pred_score_pos": 0.5952902436256409} {"content": "Archive for the ‘Moneytree Spokane’ Category\n\nHow is pre-approval dissimilar to approval that is conditional?\n\nMittwoch, Mai 20th, 2020\n\nHow is pre-approval dissimilar to approval that is conditional?\n\nIf you wish to money tree aurora begin really interested in a house, your offer shall be stronger in the event that loan quantity happens to be conditionally approved. For those who have discovered the house for you personally and also had it respected, you may be pre-approved for the mortgage loan additionally the home all at once.\n\nI have found a property and I also’m prepared to make a severe offer – exactly exactly exactly what now?\n\nIn the event that you curently have conditional approval, ahead go right! You are able to put an offer that is conditional on the house to secure it.\n\nYou want to make an offer on, getting pre-approval is the way to go if you don’t have a conditional approval but have already found the property. Start by using on the web!\n\nAre you able to get numerous pre-approvals or conditional approvals?\n\nWhen looking for just the right product that is financial the attention price the advice should be to ‘shop around’, nevertheless when you make an application for mortgage loan pre-approvals the exact opposite does work. Trying to get numerous conditional or pre-approvals may have an impact that is negative your credit history. (mehr …)", "pred_label": "__label__1", "pred_score_pos": 0.5349785089492798} {"content": "Mole Concept Definition Chemistry | itspanishautoinsurancemax.live\n\nThe mole was defined by International Bureau of Weights and Measures as \"the amount of substance of a system which contains as many elementary entities as there are atoms in 0.012 kilogram of carbon-12.\" Thus, by that definition, one mole of pure 12 C had a mass of exactly 12 g. The four different definitions were equivalent to within 1%. 10.06.2016 · Class 11 Chemistry - Some basic concepts of chemistry To get full access, visit:. Molar Mass Some basic concepts of chemistry Chemistry IIT JEE Class 11 Avanti Gurukul. Stoichiometry is one of the most important subjects in chemistry. Here's the definition of stoichiometry in chemistry with examples of calculations. You must master the following chemistry concepts to solve stoichiometry problems: Balancing equations;. Use molar proportion to determine unknown quantities of moles. The mole concept is one of the topics with which you leave your preparation of physical chemistry in class 11. One of the reasons for it being taught earlier is that the concept of mole will be required in almost every other topic of physical chemistry that you study later, irrespective of. chemistry mole concept- relative atomic mass 3,612x10^23 mole concept exam and solutions another way to measure relative atomic mass mole concept examples sample problems of mole concept mole concept element examples of mole concept Chemistry Mole tutorials 3 examples of mole.\n\n09.02.2020 · The gram formula mass GFM of a substance is known as the mass of one mole. Relative atomic masses of selected elements can be found in the SQA Data Booklet.These can be used to. The molar mass of carbon is 12.0107 g/mol. Therefore, 1 mole of CO 2 contains 12.01 grams of carbon and 32 grams of oxygen. To learn more about the mole concept and other related concepts, such as the law of definite proportions, register with BYJU’S and download the.\n\nThe mole abbreviate mol and sometimes called Avogadro‘s number is a conversion number that allows a chemist or chemistry student to move from the microscopic world of atoms, ions, and molecules to the macroscopic world of grams, kilograms, and tons. The mole conversion is used in reaction stoichiometry to predict how much product can be []. 04.08.2017 · This Mole Concept video is made for revision purpose. After learning tips and tricks, formulas, concept and numericals in this video, you will be able to understand and do any mole concept. 17.08.2018 · Don’t Memorise brings learning to life through its captivating FREE educational videos. To Know More, visitNew videos every week. T. Mole Concept – Some Basic Concepts of Chemistry – Class 11 One gram atom of any element contains the same number of atoms and one gram molecule of. 14.01.2020 · It is defined as exactly 6.02214076×1023 constitutive particles, which may be atoms, molecules, ions, or electrons.The definition was adopted in.\n\nMole Concept A mole is the amount of a substance that contains as many elementary entities atoms, molecules or other particles as there are atoms in exactly 0.012 kg or 12 g of the carbon-12 isotope. The term mole has been derived from the Latin word ‘moles’ which means a ‘heap’ or a ‘pile’. The Mole Concept Exams and Problem Solutions The Mole Concept Exam1 and Problem Solutions The Mole Concept Exam2 and Problem Solutions The Mole Concept Exams and Problem Solutions Online Chemistry Tutorials.\n\nKerala State Syllabus 10th Standard Chemistry Solutions Chapter 2 Gas Laws Mole Concept Gas Laws Mole Concept Text Book Questions and Answers. Gas Laws Mole Concept Exam Oriented Questions and Answers. Very Short Answer Type Questions Score. Mole Concept In chemistry the mole is a fundamental unit in the Système International d'Unités, the SI system, and it is used to measure the amount of substance. This quantity is sometimes referred to as the chemical amount. In Latin mole means a \"massive heap\" of material. It is convenient to think of a chemical mole as such. Source for information on Mole Concept: Chemistry: Foundations.\n\nThe study of atoms and its related traits lay the foundation for chemistry. Atomic mass is the concept related to a single atom, whereas molecular mass relates to a group of atoms. If you are planning to proceed with this concept, then it is necessary to gain precise knowledge about molecular mass and mole concept. Let us proceed! Suggested Videos. Below are some important points to get clear mole concept, definition of mole chemistry and mole units.Mole can be define as,The atomic mass, molecular mass, ionic mass or formula mass of a substance expressed in grams is called mole of that substance. Mole Concept What is the Mole Concept? Most of our routine items are sold in specific numerical quantities along with definite names. For instance, soda cans come in a pack of six. For this purpose, the mole is used, which seems to be very important for modern chemistry. One mole of a substance is equal to 6.022 × 10²³ units of that substance such as atoms, molecules, or ions. The number 6.022 × 10²³ is known as Avogadro's number or Avogadro's constant. The concept of the mole can be used to convert between mass and number of particles.\n\nSo, to solve this issue, the mole concept was developed to establish a fixed quantitative value. Mole is an SI unit of amount of substance. The accepted definition of mole is described below: Previous Definition: according to, previous definition, the value which we used. On the other hand, one mole of any substance contained exactly as many molecules as one mole of any other substance. As a consequence of this definition, in the SI system the Avogadro constant N A had the dimensionality of reciprocal of amount of substance rather than of a pure number, and had the approximate value 6.02 × 10 23 with units of. IB Chemistry notes on stoichiometry and the mole concept. Molecules are made up of two or more atoms chemically bonded together. Ions are specialised atoms or groups of atoms chemically combined together that have lost or gained electrons and posess an overall electrical charge. Filed Under: Atoms and Molecules, Class 9 Tagged With: avogadro's number, mole, mole concept, mole of atom, mole of molecules, moles of substance, number of moles About Mrs Shilpi Nagpal Author of this website, Mrs Shilpi Nagpal is MSc Hons, Chemistry and BSc Hons, Chemistry from Delhi University, B.Ed I. P. University and has many years of experience in teaching. Definition. The mole n, abbreviated as mol, is a fundamental chemical quantity that characterizes the amount of substance. It is defined that 1 mole of any substance contains 6.02x10 23 particles atoms, molecules, ions, electrons. 6.02x10 23 is a unique number, called Avogadro’s number. Amedeo Avogadro was the first scientist to determine the actual number of particles in a mole.\n\nAtoms and molecules are very small and the mole concept allows us to count atoms and molecules by weighing macroscopic amounts of material. What is the definition of a mole in chemistry? Chemistry is the scientific discipline involved with elements and compounds composed of atoms, molecules and ions: their composition, structure, properties, behavior and the changes they undergo during a reaction with other substances. In the scope of its subject, chemistry occupies an intermediate position between physics and biology. It is sometimes called the central science because it. This high values note brings you a highly organized set of information of mole concepts, recent updates in the definition, and various problem solving approaches in mole concept and concentration.\n\nMole is also called Avogadro constant which is denoted by N A. As per definition- One mole is the amount of a substance that contains as many particles or entities as there are atoms in exactly 12 g of the C-12 isotope. Learn the mole concept table. After an extensive consultation with the chemistry community, and following a review and critical evaluation of the literature, IUPAC is recommending a new definition of the mole based on a specified number of elementary entities: The mole, symbol mol, is the SI unit of amount of substance. In chemistry, molar concentration also called molarity, amount concentration or substance concentration is a measure of the concentration of a solute in a solution, or of any molecular, ionic, or atomic species in a given volume. Definition - Molar concentration or molarity is most commonly in units of moles of solute per liter of solution.\n\nSoft Play Klatreblokker\nBooks In The Great American Read\nSteelseries Rival 710 Oled\nMcdonald's Corporation Aksjer\nOverraskelse Bday Decorations\nIkke-fornybar Energi Mot Fornybar\nBall By Ball Psl 2019\nConverse Chucks Rose Gold Low\nBlack Reborn Twins\nGrillet Kylling I Sakte Komfyr\nFruktbare Vaktelegg Til Salgs I Nærheten Av Meg\nLips Lumpy After Filler\nWorld Cup-billetter Til Semifinale I England\nSamsung S7 Skjermreparasjonssett\nGreyt Angels Greyhound Adopsion\nUtskifting Av Kirurgisk Ventil\nMark Schmidt St. Bonaventure\nRaskt Voksende Damplanter\nAetna Ent Leger\nEgypt Reiserute 12 Dager\nMålbutikk Nær Meg Åpne Nå\nSkorpion Michael Jackson\nEasy Gluten Free Chocolate Cupcakes\nMadagaskar Vesende Kakerlakk Vitenskapelig Navn\nChase Sapphire Reserve 10000 Poeng Bonus\nSitater På Trehuset\nMin Takknemlighet Til Deg\nSunn Instant Pot Meal Prep\nBusiness Casual Apparel\nRestauranter Som Leverer I Nærheten Av Meg Og Tar Penger\nKronprinsessen Thai Ep 4 Eng Sub\nMaslow Hierarki Av Behov Google Scholar\nLego Ps4 Dc Super Villains\nTiny House From Container\nOrmer I Urinveier\nDepresjonseffekter På Familie Og Venner\nDell Optiplex 3470\nHundens Mage Lager Gurglingstøy\nUcl Akademisk Kalender\nsitemap 0\nsitemap 1\nsitemap 2\nsitemap 3\nsitemap 4\nsitemap 5\nsitemap 6\nsitemap 7\nsitemap 8\nsitemap 9\nsitemap 10\nsitemap 11\nsitemap 12\nsitemap 13\nsitemap 14\nsitemap 15\nsitemap 16\nsitemap 17\nsitemap 18\nsitemap 19\nsitemap 20\nsitemap 21\nsitemap 22", "pred_label": "__label__1", "pred_score_pos": 0.9989861845970154} {"content": "Is The Shiruto Clinically Proven By The Medical Development And Science Researches Department?\n\nShiruto can be a medical formula that helps in improving the functionality of the immunity process. This time around pandemic period of time immune system technique is the foremost and principal goal for each man or woman. Shiruto features any substances that really help in increased appetite and defense action figure process in our body. Its content has-\n\n•The wheat or grain concentrated amounts, that are obtained from your amazing fermentation approach which is the major ingredient to enhance the immune system.\n\n•The formula also offers essential vitamins for immune cellular material, vital for nutrition to man health insurance and system.\n\nSo, we are able to clearly point out that the principle focus on: of Shiruto would be to increase the resistance method in our body for good health.\n\nFunctioning procedure of Shiruto\n\nAs we human beings are ingesting and breathing in millions of probable pathogens daily in our life. This is the major reason behind the health problems and ailments within our human body, which can be very severe and hazardous to overall health. These pathogens contain unwanted organisms, malware, dust particles, substances, microorganisms, fungi, various other dangerous cellular material.\n\nMoreover, as we all know that your body includes a very innovative and simple defense mechanisms, which actually works as being the Shield and shield our system for 24 hours. In addition, it offers you safety against pathogens plus removes the unnatural tissues in your body. Even so, when you face any problems with regards to the immune problem, you might be recommended to eat the Shiruto. You may also browse the shiruto overview from your on the internet system for more satisfaction and know item top quality. They will give you the detailed information. Individuals could also discover the state website of medication.\n\nMaking process\n\nShiruto was developed by way of a distinctive and copyrighted process since it is created specifically to ensure your optical performance of the entire body and increase your immunity mechanism. It can also help enhance the efficiency of Ip address-PA1. There are lots of more other activities which can be avoided through the Shiruto-\n\n\n\n•Hair growth\n\n•Painful Throats\n\n•Eliminate abnormal immune cellular material\n\n•Lessen high-cholesterol and many others\n\nContinuing to move forward, if you want to get great health and better science, then you are advised to decide on the Shiruto. Especially in covid-19, it helps you enhance your immunity mechanism and keep your lifestyle from your deadly infection.", "pred_label": "__label__1", "pred_score_pos": 0.8457801342010498} {"content": "ac0c04175_si_001.pdf (957.6 kB)\n\nImproving Immunoassay Performance with Cleavable Blocking of Microarrays\n\nDownload (957.6 kB)\njournal contribution\nposted on 11.12.2020, 14:42 by Yuri M. Shlyapnikov, Ekaterina A. Malakhova, Elena A. Shlyapnikova\nAmong the key issues that are commonly associated with the development of microarray-based assays are nonspecific binding and diffusion constraints. Here we present a novel strategy addressing both of these challenges simultaneously. The essence of the method consists in blocking the microarray surface with a blocking agent containing a perfluoroalkyl chain and a disulfide linker. The resulting surface is hydrophobic, and no immiscible liquid layer remains on it upon cyclically draining and replenishing the sample solution, ensuring an efficient mass transfer of an analyte onto a microarray. Prior to the signal detection procedure, disulfide bonds are chemically cleaved, and the perfluoroalkyl chains are removed from the microarray surface along with nonspecifically adsorbed proteins, resulting in extremely low background. Using conventional fluorescent detection, we show a 30-fold increase in signal/background ratio compared to a common epoxy-modified glass substrate. The combination of this technique with magnetic beads detection results in a simple and ultrasensitive cholera toxin (CT) immunoassay. The limit of detection (LOD) is 1 fM, which is achieved with an analyte binding time of 1 h. Efficient mass transfer provides highly sensitive detection of whole virus particles despite their low diffusion coefficient. The achieved LOD for vaccinia virus is 104 particles in 1 mL of sample. Finally, we have performed for the first time the simultaneous detection of whole virus and CT protein biomarker in a single assay. The developed technique can be used for multiplex detection of trace amounts of pathogens of various natures.", "pred_label": "__label__1", "pred_score_pos": 0.5130653381347656} {"content": "Potato harvest\n\n\nRemember Heffanutt planting potatoes in spring? Now it`s time to see if he got something to harvest.\n\nHeffanutts paws are perfect for digging.\n\nLook! A potato!\n\nAnd as he digs his little heap of potatoes grow.\n\nHeffanutt digg deeper…\n\n…and deeper…. B: Heffanutt! Where are you going?\n\n\nB: I`m sorry for interrupting the story, I have to help our little friend.\n\nB: What happened? You were not supposed to dig that deep.\n\nH: Hole in the pot.", "pred_label": "__label__1", "pred_score_pos": 0.5068167448043823} {"content": "Can Damage To The Central Nervous System Be Repaired?\n\nWhat is the symptoms of nerve problem?\n\nWhat Are the Symptoms of Nerve Pain and Nerve Damage?Inability to sense chest pain, such as angina or heart attack.Too much sweating (known as hyperhidrosis) or too little sweating (known as anhidrosis)Lightheadedness.Dry eyes and mouth.Constipation.Bladder dysfunction.Sexual dysfunction..\n\nHow can I repair my nervous system naturally?\n\n\nCan you repair a damaged nervous system?\n\nA new University of Virginia study proves that a damaged peripheral nervous system is capable of repairing itself — when healthy cells are recruited there from the central nervous system.\n\nIs central nervous system damage reversible?\n\nDamage control Severe injury can halt the passage of signals through axons. Because nerve cells of the CNS are unable to regenerate, any resulting loss of motor or sensory function will be permanent.\n\nWhy can’t nerves in the CNS regenerate?\n\nAxon regeneration in the CNS fails for two reasons. First because the environment surrounding CNS lesions is inhibitory to axon growth, and second because most CNS axons only mount a feeble regeneration response after they are cut.\n\nHow do you restore your nervous system?\n\nMake sure to get adequate sleep between training sessions as this is the best way to let your central nervous system recover fully. Diet is also a way that has been shown to reduce CNS fatigue from setting in and allowing it to recover faster.\n\nHow do you strengthen your central nervous system?\n\n\nCan nerves grow back?\n\nDamage to nerves may result in reduction or a complete loss of sensation, weakness and dry skin. When one of your nerves is cut or damaged, it will try to repair itself. The nerve fibres (axons) shrink back and ‘rest’ for about a month; then they begin to grow again. Axons will regenerate about 1mm per day.\n\nCan stress cause neurological symptoms?\n\n\nWhy is it difficult to repair the CNS?\n\nWhy can’t the central nervous system repair itself after injury? … Unfortunately, some cells of the central nervous system are so specialized that they cannot divide and create new cells. As a result, recovery from a brain or spinal cord injury is much more difficult.\n\nWhat happens if there is damage to the central nervous system?\n\n\nHow do you know if your central nervous system is damaged?\n", "pred_label": "__label__1", "pred_score_pos": 0.7372484803199768} {"content": "Triple N Lease Agreement\n\nNet triple leases can increase the tenant`s operating costs and may be at the helm for deductibles on insurance policies, and they may also be responsible for property damage that is not covered by the insurance company. A three-time net lease (or “nnn”) is a form of lease in which the tenant or tenant is responsible for the running costs of the property, including property taxes, property insurance and maintenance, in addition to the payment of rent and incidental costs. A net triple lease is less complicated than it looks. Often referred to as NNN leasing, a triple net rental agreement is an agreement whereby the tenant pays either a portion or all the operating costs of an office, in addition to the basic rent. These current expenses include property taxes, real estate insurance and maintenance costs. A triple net rental agreement (Triple-Net or NNN) is a rental agreement for a property by which the tenant or the taker agrees to pay all property taxes, real estate insurance and maintenance payments (the three “networks”) on the property in addition to the normal costs to be provided under the agreement (rent, incidental costs etc.). In the case of such a tenancy agreement, the tenant or tenant is responsible for all costs related to the repair and maintenance of a common space (also known as CAM – Common Area Maintenance). CAM fees are usually negotiated in advance in the form of a dollar-set amount per square metre. A “ground leasing” is another variant of a net lease. As part of a basic lease, the landowner leases the land to the tenant, giving the tenant the opportunity to build a building.\n\nThe tenant then has an interest in the lease in the property. Under a basic lease, the tenant usually pays for the same items he paid for under a Triple Net Lease or Bondable Lease. As a general rule, ownership of the building will be returned to the owner after the lease is completed. [5] Now, several “extension” instructions have been provided for this selection, allowing you to quickly report the details of each authorized extension. The first two lines of one of these excerpts provide for the start date of the initial extension period. The next two rooms available ask you to submit the last date of the calendar to which the renewed tenancy is in effect (the termination date). The last two voids require that the amount of rent that is applicable for each “extension period” be passed on to the area concerned. In some cases, especially on large land, the owner can rent the property as two or more separate premises. If this is the case, the landlord must solidify the percentage of the base area that the tenant rents on the basis of the total area of the entire property under the control of the owner.", "pred_label": "__label__1", "pred_score_pos": 0.9397087693214417} {"content": "The National Personal Finance Challenge (NPFC) is a nationwide competition that provides high school students the opportunity to build and demonstrate their knowledge of money management. Teams showcase their expertise in the concepts of earning income, buying goods and services, saving, using credit, investing, and protecting. \n\n\n\n\n\nNational Semi-Finals will be scheduled by region to be held on one day between May 6-May 26. This round asks teams to answer online multiple-choice questions. \n\nNational Finals will ask students to create a financial plan for a detailed fictitious family scenario (case study). Students will present to and answer questions from an expert panel of judges comprised of economists and financial professionals. This round will be held June 3rd.  \n\n\nTop-performing teams at the National Personal Finance Challenge will receive a trophy, banner, and cash prizes for each student member corresponding to their team’s rank in the National Finals: \n\n1st place: $2,000\n2nd place: $1,000\n3rd place: $500\n\n\nThe National Personal Finance Challenge is a program of", "pred_label": "__label__1", "pred_score_pos": 0.9999157786369324} {"content": "Skip to main content\nCan You Save Some Cold Pizza?\n\n\nRiddler Express\n\nFrom Dan Levin comes a hazardous riddle for the ironclad and eagle-eyed:\n\nThe U.S. Open concluded last weekend, with physics major Bryson DeChambeau emerging victorious. Seeing his favorite golfer win his first major got Dan thinking about the precision needed to be a professional at the sport.\n\nA typical hole is about 400 yards long, while the cup measures a mere 4.25 inches in diameter. Suppose that, with every swing, you hit the ball X percent closer to the center of the hole. For example, if X were 75 percent, then with every swing the ball would be four times closer to the hole than it was previously.\n\nFor a 400-yard hole, assuming there are no hazards (water, sand or otherwise) in the way, what is the minimum value of X so that you’ll shoot par, meaning you’ll hit the ball into the cup in exactly four strokes?\n\n\nRiddler Classic\n\nFrom Dean Ballard comes a pernicious pizza puzzle:\n\nDean ordered a personal pizza that was precisely 10 inches in diameter. He ate half of it, and he wants to save the remaining semicircle of pizza in his refrigerator. He has circular plates of all different sizes, so to save space in his fridge, he’ll place the pizza on the smallest plate that holds the entire semicircle (i.e., with no pizza hanging off the plate).\n\nUnfortunately, the smallest plate that can hold half of a 10-inch pizza is just a circle with a 10-inch diameter. So much for saving space.\n\nBut Dean has a thought: If he cuts the pizza, he can squeeze both of the resulting pieces onto a smaller circular plate — again, with no pizza hanging off the plate and without the pieces lying on top of each other.\n\nIf Dean makes a single straight slice, what is the diameter of the smallest circular plate onto which he can fit the two resulting pieces?\n\nExtra credit: Dean wants to save even more space in his fridge. So instead of one straight slice, he will now make two straight slices. First, he will cut the semicircular pizza into two pieces. Then, he will take one of those pieces and make his second slice, giving him a total of three pieces. What is the diameter of the smallest circular plate onto which he can fit all three pieces?\n\n\nSolution to last week’s Riddler Express\n\nCongratulations to 👏 Graham E. McGrath 👏 of Boston, Massachusetts, winner of last week’s Riddler Express. (This problem might have hit a little too close to home for Graham, who is a lab technician and uses centrifuges for a living!)\n\nLast week, you were doing your best not to break a microcentrifuge, a piece of equipment that separates components of a liquid by spinning around very rapidly. Liquid samples were pipetted into small tubes, which were then placed in one of the microcentrifuge’s 12 slots evenly spaced in a circle.\n\nAnimation of a centrifuge with 12 slots spinning around.\n\nFor the microcentrifuge to work properly, each tube had to hold the same amount of liquid. Also, importantly, the center of mass of the samples had to be at the very center of the circle — otherwise, the microcentrifuge would not be balanced and likely break.\n\nYou needed to spin exactly seven samples. In which slots (numbered 1 through 12, as in the diagram above) could you have placed them so that the centrifuge was balanced?\n\nBalancing centrifuges is certainly not a new problem, and was previously addressed on the Numberphile YouTube channel, with Holly Krieger explaining the solution.\n\nIn the case of 12 slots, it was always possible to balance the centrifuge for any even number of tubes. All you had to do was arrange them into pairs and place each pair on diametrically opposite ends of the circle. The center of mass of each pair was at the center of the circle, which meant the total center of mass was also at the center.\n\nAlas, the problem asked how you could place seven tubes, and seven is not an even number. Several readers suggested adding an eighth tube, which was against the spirit of the puzzle.\n\nAs for odd numbers of tubes, balancing a single tube was not possible. However, it was indeed possible to balance three tubes by arranging them evenly around the circle so they were the vertices of an equilateral triangle (e.g., in positions 1, 5 and 9 in the diagram above). It was further possible to balance five tubes by again arranging three so they formed an equilateral triangle (e.g., in positions 1, 5 and 9) and another two on opposite sides (e.g., in positions 2 and 8). Again, because the centers of mass for both the trio and the pair were at the center of the circle, their combined center of mass was also at the center of the circle.\n\nReturning to the original puzzle, it was possible to balance seven tubes by arranging three in an equilateral triangle, another two on opposite sides and the last two on a different pair of opposite sides. (Alternatively, some solvers noted that placing seven tubes was equivalent to choosing the five slots that didn’t have tubes, which was essentially the same problem as placing five tubes.) There were several correct answers here — more on that in a second — one of which was slots 1, 2, 5, 6, 8, 9 and 12, found by solver Alicia Zamudio.\n\nFor extra credit, you had to find the total number balanced arrangements for seven tubes. It turned out that there were exactly 12 arrangements, all rotations of each other. Solver Reece Goiffon verified this by finding all the ways seven vectors on a unit circle could add up to zero:\n\nMeanwhile, in what I believe is a first for The Riddler, Chris Sears wrote code in Commodore 64 BASIC, checking all 792 (i.e., 12 choose 7) ways to place seven tubes in 12 slots.\n\nThe general version of this problem, with N slots and k tubes, was addressed in the aforementioned Numberphile video and was further proven by T. Y. Lam and K. H. Leung back in 2000. As for how many arrangements there are for given values of N and k, there’s an OEIS sequence for that! (Thanks to solver Eric Thompson-Martin for spotting it.)\n\nWhen N = 12 and k increased from 0 to 12, the number of balanced arrangements was 1, 0, 6, 4, 15, 12, 24, 12, 15, 4, 6, 0 and 1. If you look closely, you’ll see that the sequence is symmetric, since placing k tubes was exactly the same problem as choosing where not to place k tubes.\n\nI encourage readers to verify these results for themselves. But not the grad students or technicians out there. I don’t need angry lab directors emailing me about broken centrifuges.\n\nSolution to last week’s Riddler Classic\n\nCongratulations to 👏 Lowell Vaughn 👏 of Bellevue, Washington, winner of last week’s Riddler Classic. (Lowell is finally joining his son in the winner’s circle.)\n\nLast week, you were introduced to an online game, Guess My Word, in which you tried to guess a secret word by typing in other words. After each guess, you were told whether the secret word was alphabetically before or after your guess. The game stopped and congratulated you once you had guessed the secret word.\n\nThe secret word was randomly chosen from a dictionary with exactly 267,751 entries. If you had this dictionary memorized and played the game as efficiently as possible, how many guesses should you have expected to make to uncover the secret word?\n\nMost solvers recognized that the most efficient strategy was a binary search, where you first guessed the middle word in the dictionary. If the secret word came later, you then guessed the middle word in the second half of the dictionary. But if the secret word came earlier, you guessed the middle word in the first half of the dictionary. With each guess, you narrowed the possibilities by approximately half, and there was also a chance that the guess itself was the secret word.\n\nThe sequence of guesses could therefore be structured as a complete binary tree whose top node was your first guess (the exact middle word in the dictionary). If the secret word came earlier in the dictionary, you moved to the right; if the secret word came later in the dictionary, you moved to the left. Eventually, you’d find the secret word.\n\nNow that you had the optimal guessing strategy, all that was left was calculating the average number of guesses. In your binary tree, one word — the middle word in the dictionary — would be guessed on the very first attempt. Two words required two guesses, four words required three guesses, eight words required four guesses, 16 words required five guesses, and so on. For each additional guess, there were twice as many words.\n\nIt turned out that the number of words in the dictionary, 267,751, was 1 + 21 + 22 + 23 + … + 216 + 217 + 5608. And each term in the sum required one more guess than the term before it. To find the average number of guesses, you had to divide each of these terms by 267,751 and then multiply by the corresponding number of guesses. In the end, the average was approximately 17.042 guesses.\n\nSeveral solvers, like Michael Branicky, Josh Silverman and Rajeev Pakalapati, generalized this method, finding a formula for the expected number of guesses for a dictionary with any number of words. Meanwhile, Emma Knight went in a completely different direction — recursion — still arriving at the same solution.\n\nThanks again to Oliver Roeder for introducing Riddler Nation to this fun word game. (If only it weren’t so darn addictive.)\n\nWant more riddles?\n\n\nWant to submit a riddle?\n\nEmail Zach Wissner-Gross at\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7258173227310181} {"content": "Vonage is a communications provider that is one of the pioneers in the VoIP industry, and the company has been taking many steps over the years to improve customer experience. One of the ways that they keep their customers happy is by delivering a comprehensive support experience. This past week, we had the opportunity to sit down with Ken McMahon of Vonage to talk about Vonage support.\n\nMr. McMahon is the SVP of Client Operations, and he was able to give us a peek into how Vonage tackles multichannel customers, self-service, and third-party software. He even gave us some insight into turnaround and daily support processes. Let’s get to it!\n\nWhat channels can customers use to reach Vonage support? Hours? Devices? Locations?\n\n\nKen: Today’s ultra-connected customers expect answers and solutions to their questions and issues when they need it and where they need it. At Vonage, we are making sure we are available and ready to connect with our customers wherever and whenever they need us. We have multiple channels available for the customers to reach us, including a community portal, where customers can access our Support Site, external knowledge base and find answers to common questions in links to guided assistance workflows.\n\nFor immediate assistance, we have AI chatbots available 24 hours per day, while live voice agents are available from 7 a.m. to midnight EST from Monday through Friday and from 9 a.m. to 9 p.m. EST over the weekends – for a truly 24×7 customer service experience. Customers can also create a case through our support site at their convenience and receive a prompt solution from our care team. Our live agent chat service is available from 9 a.m. to 9 p.m. EST throughout the week and will be expanding to weekend service soon.\n\n\nDoes Vonage offer customer support via SMS?\n\n\nKen: Although we do not offer SMS support at this time, customers looking for support options available from their mobile device can use our Vee chatbot and create a case via the Vonage mobile app.\n\n\nWhat channel seems to be the preferred channel for customers reaching out to Vonage support?\n\n\nKen: The preferred channel seems to be related to the type of customer issue, i..e. The more technical the issue the more likely the customer will want to speak to a phone agent.  For simpler issues, like how to use a feature or questions on their bill or status, chat is a popular option. Chat currently averages about 13% of our total customer contacts\n\n\nIn your opinion, what support channels are going to be the most popular in the next decade?\n\n\nKen: While there will always be customers who prefer the phone, we anticipate that use of our digital channels (chatbot, live chat, online support articles and step by step guides, and live chat) will continue to grow. Using chatbots, we are able to answer more than 60% of customer questions, eliminating the need to speak to an agent and providing them with immediate answers. Similarly, we are deploying natural language processing in our IVR, and providing the ability to complete simple tasks using IVR-provided instructions or receiving a link to a step by step guide.  We anticipate that, as customers become more confident with these tools and as the tools themselves continue to evolve, these AI tools will become the preferred channel for non-technical issues.\n\n\nWhat’s the average turnaround time for a live chat support session?\n\n\nKen: The average handle time for chat sessions is currently less than 20 minutes.\n\n\nDo you find this channel to be more efficient for customers needing support? What kinds of issues aren’t handled as effectively?\n\n\nKen: While live chat gives the customer immediate access to a customer support agent and is approximately 35% more efficient due to multi-session handling, technical issues are handled better when using live voice.\n\n\nHow does multi-session handling work at Vonage?\n\n\nKen: Chats are routed to chat agents based on the type of issue the customer has specified.  If a customer has a technical issue, the agent will receive only that chat until he or she has completed the session.  For customer service type issues (e.g. feature-related) multiple chats will be directed to an available agent (up to 2 concurrently) as these are easier to manage via multi-session.\n\n\nWhat are the best times that a customer might have an easier time calling in to support?\n\n\nKen: During core business hours, our live voice agents definitely receive more inquiries. During those times, if a customer has a simple request that can be handled by the live chat agent, they may prefer to take that route. Before and after core business hours when volumes decline, customers may find it easier to reach a live voice agent. That said, our customer service team is ready and able to support our customers no matter when they need us.\n\n\nDo you have dedicated reps for each of your support channels?\n\n\nKen: Yes, we have dedicated reps or queues for customer service, technical support, billing, porting, retention, chat and VIP with managed overflow for priority queues.\n\n\nHow does Vonage ensure that its customers are routed to the correct agents or groups of agents?\n\nKen: We use skills-based routing as well as automatic number identification (ANI) to identify specific customers, their segment, and any special handling, in addition to asking them in the IVR what they are looking to accomplish. This information dictates the queue to which they are routed, with additional rules in place should there be a longer than usual wait time.\n\n\nExplain how Vonage support reps provide a high level of customer satisfaction.\n\n\nKen: As a business services provider who has acquired multiple technology companies over the past several years, we continue to work to consolidate and optimize our infrastructure. While this can impact our customers from time to time, our Support team works closely with our internal technology and engineering teams to make sure we communicate and support our customers effectively during any changes and upgrades.\n\n\nWhat are Vonage customers saying about the support experience?\n\n\nKen: Because we generate customer surveys upon completion of agent interactions, we have countless examples of our agents going above and beyond.\n\nHere are some examples of what our customers are saying:\n\n • “Thomas’s mad skills were amazing. I wanted to match an already recorded auto-receptionist message with options – one for me, two for voicemail. After initially thinking a costed option was the only solution, he worked the problem and found the perfect answer. It was outstanding customer service.”\n • “He was very professional and patient with me. I appreciated him giving me details while we waited. He also helped me set up the Vonage app on my mobile while we waited for the desk phone to finish setting up. I couldn’t have been more pleased with his efforts.”\n • “Setting a great example on how a call should be handled from start to finish. He was well informed on the product, courteous, friendly and eager to ensure our technical questions were answered and I was satisfied…and he did it swiftly. Great job! You guys know how to serve your customers, keep it up please!”\n\n\nNumber porting can vary by provider and case. Please share some lesser-known insights as to what a customer can do to make the process easier.\n\n\nKen: Issues with porting most often stem from incomplete or inaccurate information provided in the Letter of Authorization (LOA). In some circumstances, we’ve seen issues with inconsistent processes supported by smaller local carriers. Customers taking extra care as they complete the porting request or ask questions before submitting makes the process easier.\n\n\nWhat are some issues that many of your customers face that could easily be solved by your self-service portal?\n\n\nKen: In many cases, our customers choose to speak or chat with a live agent when they could easily add or change services – with guided assistance – via self-serve. At the same time, we’ve seen measured reduction in calls with live agents regarding topics for which we’ve implemented guided assistance workflows through our self-service portal.\n\n\nFor what issues or purposes are customers more commonly using the self-service features?\n\n\nKen: Some of the most common uses of self-service are account setup questions and flows, such as adding users, setting up extensions, configuring the Virtual Receptionist, or setting up their devices.\n\n\nCan you share which channels have the highest number of agents for support?\n\n\nKen: Our customer service and technical support live voice channels have the highest number of agents and call volume.\n\n\nWhere exactly are all of your customer service departments based? We know there’s one in NJ, where else?\n\n\nKen: Vonage is a global company and we have support teams throughout North America, Latin America, EMEA and APAC. In North America, for example, we have customer service and technical teams located in Atlanta, GA and Scottsdale, AZ, as well as Holmdel, NJ.\n\n\nDoes Vonage provide customers with hands-on support for third-party integrations? If so, to what extent?\n\n\nKen: Our support team offers assistance with setting up integrations with third party business applications such as Salesforce, Bullhorn, Office 365, ZenDesk, GSuite and many others.\n\nAgents are available to assist with items such as account settings, configuration tools, user integrations, reporting and workflow settings to fully integrate our customers’ mission-critical business applications and CRM tools into their Vonage communications solutions for enhanced productivity and a more seamless overall experience.\n\n\nWhat makes Vonage support unique compared to other providers?\n\n\nKen: Our online guided assistance workflows continue to gain adoption and demonstrate an increasing ability for the customer to effectively self-serve. With over 70 production workflows related to customers’ most common support requests and self-serve interactions increasing by over 200% last year, we’re continuing to invest and fine-tune this highly valuable technology.\n\nWe’re also continuing to leverage our own Vonage contact center capabilities to enhance the customer experience, including our IVR and voice AI technologies.\n\n\nHow is voice AI making it easier for Vonage customers to achieve self-service results?\n\n\nKen: Voice AI allows us to understand the customer’s issue, and in some cases, present the answer within the IVR via chatbot.  It also allows us to provide customers with permalinks via SMS for some of our most common workflows.\n\n\nHow does your team deal with customer language barriers?\n\n\nKen: We have multi-lingual personnel within our support teams to assure we are ready and able to assist customers in any language as circumstances require.\n\n\nWe appreciate the time that Ken took to help us find out more about Vonage and its customer service practices. Customer satisfaction is an essential metric for any business, and it’s good to see that Vonage has such a strong commitment to delivering strong customer experiences via a comprehensive support structure.\n\nIt’s also encouraging that Vonage has a multichannel structure that provides live chat and phone support. It’s all about providing customers with options that can make the contact experience comfortable, and Vonage is clearly taking the right steps. Vonage is one of the UC brands that really delivers features, so check out how it stands out as a Nextiva alternative.", "pred_label": "__label__1", "pred_score_pos": 0.8575398325920105} {"content": "Centimeter Ruler Clipart\n\nCentimeter Ruler Clipart\n\nS Shaped Ruler Printable Page – Would you possess a Printable Ruler and do not understand what to complete with it? Keep reading to find out the best way to use this essential device in almost any venture you undertake.\n\nPrintable Rulers For Preschool - Bing Images | Bible Crafts\n\nThere are many Printer available right now and most of them come using the fundamental functions. You’ll be able to select a smaller sized model that prints only on black ink or even a larger one that prints on the wide variety of colors. With these 2 in your hands, the two questions which are in your thoughts will be how you can utilize them and exactly where to utilize them.\n\nWith all the abilities of present-day printers, one of the most important resources will be the paper and this may be used for simple makes use of or for complicated requirements. To start out with, make use of the printable ruler to ascertain when the color from the ink around the paper matches that from the colors you need to print around the wall. If it does, print the web page and lower it out, fold it carefully, and location it next to the wall where you will need it the most.\n\n\nRulers appear in different styles and dimensions. Because of this they can provide several reasons, especially if you are going to utilize them outside. The need for any greater Ruler is critical if you are likely to produce a format with special elements including columns and little photos. In the event you do not have a big adequate Ruler, create a short term chart and trace it within the surface area of the huge Ruler.\n\nRulers can be utilized for decoration, whether or not you’re making a small or huge format. In the event you would like to add some text to your wall, commence by tracing the lines of the ruler onto the surface area in the paper using the identical color as your selected text.\n\nBlank Ruler Template For Kids | Printable Ruler, Ruler\n\nOnce you find the most effective design, you’ll be able to erase the excess paper and spot the Ruler around the paper. Go away the ruler around the surface of the paper until finally you are ready to remove it. Attract a line around the Ruler for dividing the surface area of the paper into five equal parts. Mark from the very first mark, and repeat the procedure within the other four marks.\n\nThis can be a extremely straightforward concept and will assist you to conserve time when you have to draw a line around the wall. When you find yourself satisfied with all the end result, all you’ve to do is connect the Ruler for the line and attract the appropriate traces.\n\nCentimeter Ruler Clipart\n\nLastly, when you find yourself concluded drawing the lines around the wall, just consider your Ruler and reduce it out. This helps make a fantastic Instrument to make use of in any project you undertake!", "pred_label": "__label__1", "pred_score_pos": 0.9834755063056946} {"content": "What Are The 4 Theories Of Art?\n\nAre there theories in art?\n\nTheories of aesthetic response or functional theories of art are in many ways the most intuitive theories of art.\n\nAt its base, the term “aesthetic” refers to a type of phenomenal experience and aesthetic definitions identify artworks with artifacts intended to produce aesthetic experiences..\n\nWho started the aesthetic trend?\n\nThe movement started in a small way in the 1860s in the studios and houses of a radical group of artists and designers, including William Morris and Dante Gabriel Rossetti, reformers who explored new ways of living in defiance of the design standards of the age as revealed in the 1851 Great Exhibition at Hyde Park, …\n\nWhat is the relationship between art and philosophy?\n\nPhilosophy is theoretical from beginning to end, whereas art is sensuous and imaginal. Philosophical thought reflects its subject-matter in concepts, in categories; art is characterised, on the other hand, by emotional and imaginal reflection and by transformation of reality.\n\nWhat are the 4 components of aesthetics?\n\n\nWho is an Aesthete?\n\n\nWhat are the 8 forms of art?\n\n\nWhat are the philosophies and theories of art?\n\n\nWho is the father of aesthetic?\n\nOscar WildeThe Aesthetic Movement was an artistic movement in the late 19th century where artists adopted an attitude of “art for art’s sake” rather than art driven by socio-political themes. Q: Why is Oscar Wilde considered the father of the Aesthetic Movement?\n\nWhat is mimetic theory of art?\n\nMimesis, basic theoretical principle in the creation of art. The word is Greek and means “imitation” (though in the sense of “re-presentation” rather than of “copying”). … Therefore, the painter, the tragedian, and the musician are imitators of an imitation, twice removed from the truth.\n\nWhat is the highest form of art?\n\nLiteratureLiterature – the highest form of art.\n\nWhat are the 5 philosophies of art?\n\nFive Philosophies of Art (Theories of Art)Art Aesthetics & Criticism.Art Criticism- An organized approach for studying a work of art.Street Art Chalk Murals. Graffiti Artwork: Public Pedagogy Some artists create graffiti in order to send positive visual messages to a larger and more.Emotionalism.\n\nWhat are the three theories of aesthetics?\n\nThese three aesthetic theories are most commonly referred to as Imitationalism, Formalism, and Emotionalism.\n\nWho is the father of art?\n\n\nWhat are the 3 theories of art?\n\nThe three aesthetic theories of art criticism are most commonly referred to as Imitationalism, Formalism, and Emotionalism. on realistic representation. of art using the principles of art.\n\nWhat are the 7 different forms of art?\n", "pred_label": "__label__1", "pred_score_pos": 0.9999921321868896} {"content": "Protein space and the emergence of proteins on primordial Earth\n\nProteins share similar amino acid segments with one another. Such 'reuse of parts' has clear evolutionary advantage over ‘design from scratch', which often generates segments that cannot even fold, let alone be active. The best characterized form of reuse involves ‘domains’, where the shared segments are of 100 amino acids on average. It is, however, conceivable, that proteins reuse even smaller segments. If so, such segments can be regarded as the basic evolutionary units of proteins. To study this eventuality, we searched among two large and representative sets of proteins (~15,000 domains and ~20,000 full chains) for elongated amino acid segments that are similar in sequence and structure. Using an in house methodology that was tailor made for this study, we presented the results as a similarity network, where the proteins/domains were shown as nodes, and the edges connected proteins/domains that are similar, i.e., evolutionarily related. Indeed, this network view showed that protein space features a large connected component of domains that share smaller segments with each other, as well as many isolated ‘islands’, each corresponding to specific architecture (see figure below). We observed reuse of amino acid segments of variable lengths, and called the reused parts ‘themes’ (as in ‘variations on a theme’). Very complex patterns emerged, where the same amino acid can appear both within a short reused theme, shared by many proteins, or within a longer theme, shared by few. This study suggests a recursive model of protein evolution, in which themes of various lengths, typically smaller than domains, ‘hop’ between contexts, and those that are fit remain, leaving traces for us to detect.\n\nNetworks of similarity among protein structural domains. Edges connect nodes that correspond to similar domains, such as the two at the center, sharing similarity in the cyan segment. Considering networks based on increasingly lax thresholds to identify similarity relationships is analogous to moving back in evolutionary time. Image courtesy of Varda Wexler of the multimedia unit of the faculty of Life Sciences.\n\nIn another project we aimed to shed light on a key mystery in protein function evolution: how did protein-ligand binding and recognition emerged, and how have they continued to evolve? To study these questions we focused on proteins that interact with adenine-containing enzyme cofactors, such as ATP, flavin adenine dinucleotide (FAD), S-adenosyl methionine (SAM), etc. We chose these cofactors because they have been present on Earth since the beginning of life. We designed a computational pipeline, ComBind, which superimposed the structures of ~1,000 proteins based on their adenine-containing cofactors, and then compared the patterns of hydrogen bonds between protein and adenine. This analysis showed that, in contrast to previous suggestions, evolution has maximized protein-adenine binding interactions by using all three faces of adenine. Furthermore, we found that these interactions are mediated by short linear sequence motifs on the protein side. While such motifs have been previously identified, we significantly expanded the list of these motifs. As anticipated, homologous proteins shared similar adenine-binding motifs, but occasionally, proteins that do not share evolutionary origin, nevertheless shared similar adenine-binding motifs. Most interestingly, we found a link between adenine binding motifs and protein themes: specific themes are often involved in adenine binding (see figure on the right). By searching the UniProtKB database for these themes, we identified over a million proteins of unknown structure that are predicted to bind adenine. This is the first step in our attempt to establish a functional alphabet for proteins based on themes. Overall, our analysis highlighted the opportunistic nature of evolution and suggested that adenine binding emerged more than once. It offered a possible scenario for the emergence of protein function, where primordial peptides with minimal biological activity (e.g., ligand binding) gradually evolved into current proteins.\n\nMembrane proteins\n\nMembrane proteins fulfil key biological functions on the cellular and physiological levels, they are involved in numerous diseases, and accordingly, they constitute prime targets to pharmaceutical drugs. Studying membrane proteins is particularly challenging, especially on the structural level, because of their complex environment. Our research of membrane proteins has been focusing both on specific proteins and on principle aspects of protein-membrane interactions. Currently, we are mainly studying Cation/Proton Antiporters (CPAs), which play a crucial role in maintaining cells pH levels and salt concentrations. With more than 100,000 entries in UniProt, CPAs comprise one of the largest protein superfamilies. We exploited evolutionary data to predict the functional traits of CPA. Because of the multitude of CPA sequence homologues, their evolutionary relationship is complex and challenging to reconstruct, but for the exact same reason it can be very informative. We conducted the most extensive evolutionary analysis of CPAs carried so far, encompassing ~6,500 protein homologs. The analysis identified an eight-amino acids sequence motif, which not only distinguishes the two main groups of CPAs, but also seems to determine both their electrogenicity (i.e., whether they pass one or two proton per each cation) and cation selectivity (Na+ vs. K+). Furthermore, the analysis provided a new way to classify CPAs, and showed that contrary to previous suggestions, the distinction between the two main CPA groups only partially correlates with their electrogenicity. This allowed us to identify specificity-determining residues in this family (see figure on the right), and based on this, to modify CPAs function and also recover activity in an inactive CPA mutant (both verified by the Padan laboratory, HUJI). We intend to further investigate these interesting transporters using simulations and other computational techniques, where our long term goal will be to provide a detailed atomic model of the transport mechanism.\n\n\nJointly with the Mayrose and Pupko labs, we have been developing ConSurf, an automated tool that accurately predicts the evolutionary conservation of amino acid positions in proteins, and also presents the conservation on the structures of these proteins as a color map (see figure on the right). This type of analysis is of great importance to biologists, as protein positions that are functionally important tend to change much more slowly during evolution compared to those that do not have specific function. Thus, ConSurf can help protein scientists to identify functional positions in new proteins. It can also assist protein engineers finding positions within proteins that can be safely mutated to increase their activity or to change their specificity towards their substrates. While there are other methods that calculate the evolutionary conservation of proteins, ConSurf does it very accurately because it uses statistically robust approaches (Bayesian or maximum likelihood).\n\nRational Drug Design\n\nTraditional high throughput screening is a laborious and costly research, which typically is out of the scope of the academy. We use computational methods to screen large combinatorial libraries for novel drug candidates. The search algorithm finds compounds with good stereochemical fit to the structure of the protein binding site.\n\nAn example is our collaboration with the Azem Lab, where we target the Hsp60 chaperonin, which is implicated in multiple cancers. The Azem lab has determined the structure of Hsp60 in complex with its co-chaperonin Hsp10, obtaining a complex with a football-like shape. We screened a database of several million compounds, fitting each compound to the nucleotide binding site of Hsp60 and calculating the binding energies. The different compounds were ranked according to that energy. From the top ranking compounds we selected 10 compounds to be tested in empirical binding assays.\n\nThe proposed binding pose of a candidate binder within the nucleotide binding pocket of the Hsp60 chaperonin.\n\nThe George S. Wise Faculty\nof Life Sciences\nEdmond J. Safra Center for Bioinformatics", "pred_label": "__label__1", "pred_score_pos": 0.866631805896759} {"content": "\n\n10 Exercises For Financial Fitness In 2016\n\nSure, physical fitness is a common New Year’s resolution to get our bodies back in shape, especially after all the damage from the holiday season, but how about our finances? They typically suffer as well during all the holiday shopping for presents and entertaining. A new year presents new opportunities to get ourselves on the right track towards financial well-being.\n\n1. Put together a net-worth statement\n\nSo much information can be gathered from reviewing a personal balance sheet and understanding all the details of each asset and liability. It also serves as an exercise to get your arms around everything you have, what it is, where it’s held, the balance, how it’s structured, who owns it, etc. This tool helps you now, but also is very helpful to the executor of your estate as s/he is responsible for gathering all of your assets and liabilities should something happen to you. An internet search for a personal balance sheet or net worth statement will yield samples to follow. We could also provide one if you contact us.\n\n2. Develop a spending plan and keep at it for lifetime\n\nGetting the balance sheet in order can be difficult because each dollar is pulled in multiple directions—saving, debt, college, lifestyle, etc. Have hope. Most people can free up more cash by understanding what they spend their money on in a year and making informed decisions off that information. A spending plan is important at every stage of life—pre-retirement when you’re accumulating, and in retirement when you’re trying to preserve what you have. Knowledge is power. Maybe those coffee stops add up to more in a year than you thought. How about all those times dining out? Do you pay for premium cable channels or streaming services you never use? Could you spend less at the grocery store? Could you go with fewer minutes or data on your cell phone plan if you manage usage? Possibly there are things you could do to save on your energy bill. Perhaps there are ways to vacation more conservatively if need be. The key is to add expenses up over a year to get the full impact of the costs and potential savings opportunities. Little things add up to bigger, more meaningful things, so even little savings steps can make a big difference. The proverb, “Little drops of water make a mighty ocean,” is right on point.\n\n3. Manage debt\n\nGet a handle on all of your debt—the balances, interest rates, monthly payment, and maturity date. Does it make sense to refinance your mortgage before rates go up further? Do you have a home equity line of credit with an interest rate that will float up as rates rise? Perhaps you could refinance that with the mortgage. Though it makes financial sense to pay other debt down by focusing on the highest interest rate balances, many people are more successful by first paying off the lower balances. The cash that’s freed up by eliminating a monthly payment can then be applied to the next smallest balance, and so on. It’s motivating to see balances disappear by the snowballing effect, and you’ll be more likely to stick with it.\n\n4. Shape up your emergency fund\n\nYour emergency fund should be approximately three to six months of living expenses, and more if you have job insecurity or are retired. While you’re paying down debt, you might only be able to have a couple of months of living expenses saved. Consider an online high-yield savings account to hold your emergency reserves. Having a home equity line of credit open and ready to go (but untapped) is also helpful in an emergency. Typically, you can’t get one approved when you have certain emergencies, such as a job loss.\n\n5. Add to retirement savings\n\nThere are no loans or scholarships in retirement, so this should be a priority. Retirement can be costly, but just how costly depends mostly on your lifestyle. Some people can get by on very little, whereas others need a significant amount of savings to support a high lifestyle. Either way, the more you can save as early as you can, the better prepared you will be. It’s never too late to start. Consider increasing the amount you contribute and likely your lifestyle will adjust to the slightly lower paycheck. Split raises by increasing the amount you contribute to retirement by half of your raise and leaving the rest for an increased lifestyle. If you own a business and don’t have a company retirement plan, consider implementing one of the various options. Otherwise, contribute to an IRA or supplement other retirement plan contributions with contributions to an IRA, even if the contributions are nondeductible.\n\n6. Consider a Roth IRA\n\nIf you qualify, contribute to a Roth IRA for tax-free growth opportunities and other distribution advantages. If you don’t qualify to contribute directly to a Roth IRA and don’t have any other IRAs with pre-tax balances, you could do a back-door Roth IRA by making nondeductible contributions to a traditional IRA then converting to a Roth IRA. Consider if it makes sense to convert pre-tax traditional IRAs to Roth IRAs. Also, fund Roth IRAs for working children if you’re looking for gifting strategies.\n\n7. Save for college\n\nIf you can afford it (knowing retirement savings should be a priority), contribute systematically to a 529 college savings plan for your children’s (or grandchildren’s) education. New York’s plan offers residents up to a $5,000 tax deduction per taxpayer ($10,000 if filing jointly) even if the funds flow through the plan temporarily. Supplement that by registering at www.upromise.com to earn free college savings dollars for things you buy. Be sure there is a contingent owner on the account to simplify its passage should something happen to you.\n\n8. Review your investment strategy\n\nDon’t neglect your investment strategy in your employer retirement plans, IRAs, 529 plans, personal investment accounts, variable annuities or variable life insurance. A good asset allocation among all the asset classes allows you to maximize returns while minimizing risk. Tax efficiency should be a consideration in taxable/nonqualified accounts.\n\n9. Review insurance needs\n\nReview your homeowner’s, auto, individual and group life, disability, and long-term care insurance coverage and need. If you have sufficient cash flow or cash reserves, perhaps you could increase the deductible on your homeowner’s and auto coverage to save on premiums. Do you have sufficient life and disability coverage should something happen to you? Would you or your family be provided for? Or perhaps you no longer need the coverage you have due to your current circumstances and financial situation, then it’s a matter of choice. How would you pay for long-term care services should you or your spouse need care? Does long-term care insurance fit your situation, and can you afford the premiums?\n\n10. Review estate plan and beneficiary designations\n\nYour estate plan is more than just your will, power of attorney and healthcare proxy. It also involves your asset titling and beneficiary designations, as those also decide how assets will pass to your heirs. Understand how all of that comes together to make sure it would work the way you want. Make sure your estate planning documents reflect your wishes (executor, trustees, guardian of minor children, timing of distributions, etc.).\n\nWe all have a financial to-do list. It’s a relief to cross those tasks off the list and feel better informed and in control of our finances. 2016 could be a good year to take control. We’re here to help if needed.\n\nCindi Turoski is a managing member of Bonadio Wealth Advisors based out of our Albany, NY office.\n", "pred_label": "__label__1", "pred_score_pos": 0.638521671295166} {"content": "Vandals Strike at the Homes of Boston City Council Members\n\nOver the weekend of June 26th, multiple Boston city councilors were victims of vandalism at their personal residences. The most common tactic used by the vandals included affixing posters in the form of report cards to fences on the property of the council members.\n\nBelieved to be in response to their votes in support of passing Boston's $3.6 Billion operating budget, the vandalism struck a nerve with many in the city to include Mayor Marty Walsh who took a hard stance in condemning the vandals actions saying that it was inappropriate to target personal residences where young children reside and where neighbors can be adversely impacted.\n\nFor 2021, the budget passed in an 8-5 vote with opponents upset that more money was not reallocated from police funding to other initiatives to include public health and anti-violence acts. However, the Boston Police Department - following a trend witnessed nationwide - saw their overtime budget slashed by $12 million or 20% with these funds being reallocated to programs addressing racism, mental health services, additional programs for minority owned businesses and counseling services. Too many, these cuts did not do enough to defund the police and the 8 city council members that voted in favor of the budget have become the target of protesters.\n\nMultiple members of the Boston City Council spoke out publicly against the vandalism stating that attacking their personal homes where their significant others, children and animals live is wholly unacceptable. Since the vote has already been passed, intimidation tactics are not acceptable and will only serve to increase tension in the city. Many of the council members encouraged the public to express their dissent in other manners to include peaceful protesting and sending emails or calling council members' offices.\n\nSeveral of the homes suffered property damage and the Boston Police Department is investigating in an effort to identify those responsible. | Privacy | Unsubscribe", "pred_label": "__label__1", "pred_score_pos": 0.9477354288101196} {"content": "Sometimes, perhaps more often than not, you find your pediatric patient better able to cope with their medical issue than their parents.  Many times, parents bring their own prior medical experiences, coping skills, and beliefs about the medical event with them to their child's hospital visit, such as the actual or perceived life-threat to their child, the impact of the injury/illness on the child/family/future, and how best to protect their child from further danger.  These beliefs will determine the parent's coping ability during and after their child's medical event. Some parents could exhibit more maladaptive beliefs, such as their dreams for their child were shattered or that nobody can understand what they're experiencing. Other parents may show adaptive coping beliefs, such as using humor. Frequently, parents and families will use a mix of both.\n\nAs a healthcare provider, you can help parents (and children) reframe their distressing beliefs to cope better in four simple steps:\n\n1.) Accept the uncontrollable:\n\nProvider: \"In every situation, there are things that we cannot control. Sometimes, the uncontrollable is difficult to acknowledge or accept. What are some aspects of the situation that you feel you can't control?\"\n\nParent: \"Even though it's upsetting, my child needs to go through potentially painful treatment in order to get better.\"\n\n2.) Focus on the controllable:\n\nProvider: \"Ok, you can't control the potentially painful treatment, but what aspects of that situation can you control?\"\n\nParent: \"I can still do things to comfort and take care of my child and myself during treatment.\"\n\n3.) Identify and acknowledge your strengths:\n\nProvider: \"What strengths do you have that you can use to help comfort and take care of your child and yourself?\"\n\nParent: \"I can take each treatment one day at a time. I will remind myself and my child that with each treatment, we are one step closer to healing.\"\n\n4.) Find / use the positive aspects of the situation:\n\nProvider: \"Is there anything positive that you have learned about yourself that you can apply to this situation?\"\n\nParent: \"I didn't realize how strong my child is. Seeing how strong my child is makes me stronger as a parent.\"\n\nIn your practice, how do you help patients and their parents cope effectively?", "pred_label": "__label__1", "pred_score_pos": 0.5136337280273438} {"content": "Transform your business with modernized data and AI\n\nSingle platform to solve common data and AI challenges\n\nModernize your data workloads\n\nScale data and AI services with speed and flexibility.\n\nDrive innovation with AI\n\nMaximize your existing data and analytics investments.\n\nData integration and governance\n\nBuild a trusted foundation for analytics and AI.\n\nA prescriptive approach to success\n\nModernize your data and AI strategy on one platform for any cloud\n\nCollect your data\n\nMake all your data accessible — securely at its source — without the need for migration.\n\nOrganize your data\n\nCreate a trusted, business-ready analytics foundation that can simplify data preparation, policy, security and compliance.\n\nAnalyze your data\n\nBuild, deploy and manage AI and machine-learning capabilities that scale consistently throughout your organization.\n\nInfuse AI into your business\n\nOperationalize AI throughout your business with trust and transparency.\n\n\nIBM Cloud Pak for Data, an open and extensible cloud-native platform\n\nEliminate data silos, connect all data\n\nAutomate and govern the data and AI lifecycle\n\nOperationalize AI with trust and transparency\n\nAvoid lock-in, run anywhere with agility\n\nWhat clients and analysts are saying\n\n\n⁠— James Wade, Director of Application Hosting, Guidewell\n\n\n⁠— Leader in The Forrester Wave: Enterprise Insight Platforms Q1 2019\n\n\n⁠— EMA Top 3 Report and Decision Guide for Enterprise, Q4 2018\n\nLearn more about Cloud Pak for Data\n\nCustomize and extend to your unique data landscapes\n\nIBM Cloud Pak for Data\n\nAn open and extensible cloud-native platform providing a unified set of data and AI services.\n\nIBM Cloud Pak for Data System\n\nTrue plug-and-play enterprise data and AI in hours right out of the box, securely behind the firewall.\n\nIBM Cloud Pak for Data - Experience\n\nFree access to a hosted environment to explore IBM Cloud Pak for Data capabilities, including a guided journey where you will learn how to collect, organize and analyze your data.", "pred_label": "__label__1", "pred_score_pos": 0.5144617557525635} {"content": "Trading on margin is a common strategy employed in the financial world; however, it is a risky one. Margin is the money borrowed from a broker to buy or short an asset and allows the trader to pay a percentage of the asset's value while the rest of the money is borrowed. Like any form of borrowed money, interest is incurred.\n\nTrading on Margin\n\nTrading on margin makes it easier for traders to enter into trading opportunities as they don't have to be concerned about a large outlay of cash to acquire an asset.\n\nMargin interest is the interest that is due on loans made between you and your broker concerning your portfolio's assets. For instance, if you short sell a stock, you must first borrow it on margin and then sell it to a buyer. Or, if you purchase on margin, you will be offered the ability to leverage your money to purchase more shares than the cash you outlay.\n\n\n\nA broker will typically list their margin rates alongside their other disclosures of fees and costs. Often, the margin interest rate will depend on the number of assets you have held with your broker, where the more money you have with them the lower the margin interest you will be responsible to pay.\n\nMargin Interest Calculation\n\n\n\nIn order to calculate the cost of borrowing, first, take the amount of money being borrowed and multiply it by the rate being charged:\n\n • $30,000 x .06 (6%) = $1,800\n\n\n • $1,800 / 360 = 5\n\n\n • 5 x 10 = $50\n\n\n\n\nThe Bottom Line\n\nTrading on margin is a risky business, but can be profitable if managed properly, and more importantly, if a trader does not overleverage themself. It also makes accessing certain asset values easier as a trader doesn't need to put up the total cost of an asset when they see an interesting trading opportunity. When entering a trade on margin, it's important to calculate the borrowing cost to determine what the true cost of the trade will be, which will accurately depict the profit or loss.", "pred_label": "__label__1", "pred_score_pos": 0.9798146486282349} {"content": "New changes to the law coming into effect this week have caused many shoppers to question how their shopping trips will be impacted.\n\nThe coronavirus pandemic has transformed the way we shop, with a range of changes coming into force since the start of lockdown.\n\nWe've seen panic buyers taking all the toilet paper, people having to shop alone, and long queues outside stores to get in.\n\nRestrictions had started to ease, with more people were allowed in and shopping started to return to normal.\n\nHowever, the 'rule of six' has now come into effect from yesterday (September 14) and, shoppers are getting concerned about how this will change a weekly trip to Tesco, Asda, Sainsbury's and other shops.\n\nThe rule of six means that social groups are no longer to be any larger than six people in England.\n\nThere are exemptions to the rules, such as if your household is bigger, or for organised sports.\n\nWe have detailed everything you need to know if you're heading out to the supermarket.\n\nWill I have to queue to go shopping?\n\nThe rule has people asking \"Will I have to start queuing to get in the supermarkets again?\"\n\nWith the cooler weather set to arrive soon, the idea of standing outside in the wind and rain is not appealing.\n\nThe simple answer to this is no.\n\nDespite social gatherings being limited, rules in the shops remain the same.\n\nIt is still a legal requirement to wear a face-covering in shops (unless you are exempt) and social distancing guidelines remain at one metre.\n\nThis means that shops don't have to reduce the number of customers in-store, so shopping should stay the same.\n\nYou won't however be able to shop in groups larger than six.\n\nA spokesperson from the British Retail Consortium - which represents supermarkets - told The Mirror: \"New Government restrictions on group sizes will not affect the current shopping experience.\n\n\nWhat are the rules in supermarkets?\n\nThe main rule for shopping is that you need to wear a face covering, such as a mask or a shield.\n\nMost supermarkets still have guidance in place for customers to keep safe.\n\nDespite government advice, Asda says they are still encouraging customers to have two meters between each other.\n\nAn Asda spokesperson said: \"Throughout the pandemic, our customers have embraced many new rules to help keep everyone safe in our stores, and we are confident they will continue to show care and consideration for each other by wearing a face covering when they visit our stores.\n\n\n\nIn Tesco, customers are reminded about the face-covering rules.\n\nAnyone who forgets one is able to buy one at the entrance to stores.\n\nAt Aldi, a spokesperson said: \"Customers are encouraged to comply with the Government guidelines on face coverings but, like other retailers, our colleagues are not able to enforce these rules.\"\n\nSainsbury's also says that they will not challenge customers not coving their faces as they know that some people are not able to.\n\nHowever, Morrisons will be handing out free ones to shoppers who forget.\n\nIceland has asked customers to wear one if they can, but will not instruct staff to 'police' the rule.\n\nA spokesman said: \"We welcome the additional measures brought in by the Government and will be supporting mandatory face coverings in our stores in England, whilst observing the exemptions outlined in the latest guidance.\n\n\"However, we will not put our staff at risk by asking them to police this.\"", "pred_label": "__label__1", "pred_score_pos": 0.8267009854316711} {"content": "MusclePharm Fish Oil is tuned for those of us who hit the gym. Essential Fatty Acids, or EFAs, are essential to the human body but can only be found in a few species of fish. Athletes supplement their diets with fish oil because research suggests fish oil’s fatty acids can assist with heart function, carbohydrate breakdown and joint health.", "pred_label": "__label__1", "pred_score_pos": 0.9220738410949707} {"content": "July 12, 2016\n\nGlobal LGBT travelers face moderate risks in Brazil, as tolerance of homosexuality is mixed and risks vary throughout the country. Brazil is a country with regional, socioeconomic, and religious diversity, and it is known as a very liberal society. Nonetheless, LGBT individuals in Brazil can experience discrimination, intolerance, and threats to their physical safety due to religious and moral conservatism. Entrenched anti-LGBT attitudes may hamper efforts to expand legal protection of the LGBT community in the near future.\n\nIn Rio de Janeiro, the primary location for the majority of the 2016 Olympics events, LGBT travelers are likely to be safest in areas with a high concentration of LGBT venues and in mid- to upper-class neighborhoods. The beaches and neighborhoods of Copacabana and Ipanema are popular areas with both tourists and the LGBT community.\n\nAreas further north and west in Rio, including the Deodoro zone where a number of Olympic events will take place, have a large number of lower-income neighborhoods – known locally as favelas - that pose a risk to LGBT people. LGBT travelers visiting Brazil for the 2016 Olympics should maintain a low profile if attending the Olympic events or other parts of Rio other than areas along the southern beaches.\n\nBrazil’s relatively progressive government policies are at odds with elements of cultural conservatism in Brazilian society. Officially, the Brazilian government protects the rights of LGBT citizens and visitors. Homosexuality is not a crime in Brazil, and homosexual couples have many — but not all — of the same rights as heterosexual couples.\n\nIn 2013, Brazil’s National Council of Justice said in a statement that all same-sex civil unions must be registered as a marriage if the couple requests it and that notary publics cannot refuse to marry a same-sex couple, making same-sex marriage legal nationwide. Brazil does not have a nationwide anti-discrimination law in force, but at least 14 states and nearly 80 municipalities in the country have laws that prohibit discrimination based on sexual orientation. Despite increasing rights for the LGBT community, conservative elements within the government continue to propose anti-LGBT legislation.\n\nLGBT visitors face a moderate risk of discrimination, harassment, and violence stemming from anti-LGBT sentiment. The risk for the local LGBT community is higher. According to Grupo Gay da Bahia, an LGBT advocacy group, Brazil accounted for 44 percent of anti-LGBT violence in the world in 2015. However, the statistic is likely severely skewed due to higher rates of reporting in Brazil than in other, less accepting countries.\n\nReports of homophobic and transphobic crimes continue to increase year over year, especially in the states of Bahia and Parana. Violent crime is increasing overall throughout Brazil and attacks against LGBT individuals are as well. Short-term travelers to Brazil are at a lower risk of encountering serious problems than are those in Brazil for longer stays. Tolerance is higher in larger cities like Sao Paulo and Rio de Janeiro than in smaller communities but homophobic attacks and murders still occur in these cities.\n\nDespite the social discrimination, the LGBT communities of Rio de Janeiro and Sao Paulo flourish. Sao Paulo hosts one of the one of the world’s largest annual pride parades, with more than one million people in attendance annually. The state of Rio de Janeiro created an LGBT rights task force in 2010. It has also implemented a hotline for reporting homophobia-motivated crimes and developed military police training on LGBT issues.\n\nAs with any travel detestation, preparedness is key. If you are planning to travel to the Olympic Games in Brazil, register to join our Rio 2016 Olympics preparedness webinar for more information about LGBT security threats and mitigation advice. There will be a live question and answer session with our experts during this July 28 live webinar broadcast, on the ground in Rio.", "pred_label": "__label__1", "pred_score_pos": 0.9850366115570068} {"content": "CCC 1618 Christ is the center of all Christian life. The bond with him takes precedence over all other bonds, familial or social.1 From the very beginning of the Church there have been men and women who have renounced the great good of marriage to follow the Lamb wherever he goes, to be intent on the things of the Lord, to seek to please him, and to go out to meet the Bridegroom who is coming.2 Christ himself has invited certain persons to follow him in this way of life, of which he remains the model:\n\nCCC 1858 Grave matter is specified by the Ten Commandments, corresponding to the answer of Jesus to the rich young man: “Do not kill, Do not commit adultery, Do not steal, Do not bear false witness, Do not defraud, Honor your father and your mother.”4 The gravity of sins is more or less great: murder is graver than theft. One must also take into account who is wronged: violence against parents is in itself graver than violence against a stranger.\n\n\n1 Cf. Lk 14:26; Mk 10:28-31.\n3 Mt 19:12.\n4 Mk 10:19.\n5 Cf. Mk 10:22.", "pred_label": "__label__1", "pred_score_pos": 0.6256619691848755} {"content": "ATCO Customer Service Numbers\n\n 1. Call at +1 780-420-5719\n\n 2. 11751 186 Street Northwest, Edmonton, Alberta T5S 2W2, Canada\n 3. Directions: Follow the directions to locate ATCO\n 4. Locations Near You: Find nearby locations of ATCO\nToll Free Number: 310-5678\nToll-free wherever in North America: 1-888-511-7550\nAlternative Phone Number: 1-800-242-3447\n\nBasic Overview\nATCO, which was founded in 1947, is a company which is mostly associated with gas, electricity or construction industries. It is a holding company in Canada with diverse subsidiaries. The number of employees of the company are 9000 as of 2014. The headquarters of the company are located in Calgary, Alberta, Canada. Ron Southern was the founder of the company. In March 1968, ATCO Industries Inc. became a public company with its shares traded on the Toronto Stock Exchange. In 1970s it expanded itself into petroleum and natural gas industries. It then took to the electricity industry in the 1980s.\n\nProblem Solution\nProblem Solution: ATCO has provided answer to all possible quires on their web portal that covers common issues & problems, instructions, guidance, etc.\n\nHow To Contact ATCO Via Message?\nContact us: You can write a text message to ATCO for any issue through the contact us page of\nHave questions about your service or an ATCOenergy product? We're happy to help.\n\nService Support: You can avail service support from ATCO by following the given path.\nWe offer site services that help you prepare, establish and maintain your work site, including infrastructure, facilities operations and maintenance. .\n\nATCO Outage Reporting?\n\nATCO leading Energy utility in Canada. corporation is successfully regulating gas transmitting and construction business in realm. this is providing community over nine thousand workers. Addition to Canada, corporation is successfully regulating in Australia, Mexico, United Kingdom and US.", "pred_label": "__label__1", "pred_score_pos": 0.9189121127128601} {"content": "This passages describes what a good friend should be.\n\nLexile Level: 710L\n\nCategories: People & Places\n\nEveryone likes to have good friends. The best way to have a good friend is to be a good friend. Are you a good friend? Good friends listen to each other. They don't put each other down or say things that will hurt one another's feelings. Good friends also help each other solve problems and provide encouragement about school, parents, or other kids. You and your friends should be able to trust each other and have fun together. If someone makes fun of you or your friend, just walk away. Some kids are bullies, and they will not leave you alone if they think they're bothering you. It can be very hard to ignore a bully. If a bully won't leave you alone, tell an adult at school or home.\n\nThe Gentle Giant\n\nAlton, Illinois, is famous for three things: it is the birthplace of jazz trumpeter Miles ...\n\n\n\nAkhenaten was a pharaoh in ancient Egypt. He ruled Egypt in the thirteenth century B.C. Li...\n\n\n\nConsidered one of the most challenging races in the world, the Iditarod is a dogsled race ...", "pred_label": "__label__1", "pred_score_pos": 0.9692181348800659} {"content": "42 Lackey Dam Road, Sutton, MA\nGPS Coordinates: N42 06.184 W071 41.39430\n\nYou can enjoy a very pleasant paddle on Lackey Pond and the Mumford River. Be careful of the dam while launching. Launch and paddle away from the dam. Paddle through Lackey Pond until you find the channel (on the left) for the Mumford River. You can follow the Mumford River up past Route 146 until it becomes impassable. You can spend a couple of hours exploring and enjoying the wildlife.\n\nSuitable for all skill levels.\n\nParking: 10 cars near ramp; additional 8 near road, not ADA\nAccess: concrete boat ramp; wide and spacious; not handicap accessible.\nPortage: None\nRestrooms: None\n\n\nWatershed Map 2019 copy", "pred_label": "__label__1", "pred_score_pos": 0.5497567057609558} {"content": "FGASA Apprentice Field Guide (NQF2) Practical Course (20 days)\n\nThe 20 day course is a practical course for persons whom have already written the FGASA NQF2 theory exam at a FGASA national exam sitting and want to get practical experience in order to be practically assessed for NQF2.\n\n\n\nThe 20 day practical training period at the training providers’ facilities will consist of the following aspects\n⦁ Theoretical and practical training time (face to face).\n⦁ FGASA practical preparation and assessment.\n\nGiven the fact that the learners have already written the NQF2 theory exam and is in the process of completing the workbook, they should be theoretically prepared and thus will not need to be taught theory in detail at the training provider facility.\n\nThe main aim of the course (face to face training time) being offered at the training provider facilities is to provide learners with practical training in guiding and interpretative skills (learning to apply already accumulated theoretical knowledge in the guiding environment).\n", "pred_label": "__label__1", "pred_score_pos": 0.984720766544342} {"content": "Member of the Month: Paul Starcevich\n\nCMAC is full of individuals working hard to learn new skills, create content, and sharing it with the community. Each month we will highlight a CMAC member, their story, and the programming they create. For June, our member of the month is Paul Starcevich. He produces the show “CMAC’n on Location” which focuses on filming a lot of local musicians and occasionally other artists such as poets. Paul has been an audio engineer for several years and has volunteered his time on several staff and member productions working as camera operator to sound engineer and shown members a thing or two when it comes to sound. He also served one term on the CMAC Board of Directors.\n\n1. If you were reincarnated as an animal, what would you want to be?\nI would like to be able to continue wandering through the mountains so I think a bear would be my choice as the animal of choice.\n\n2. What is your favorite music genre and who is your favorite artist of that genre? Song?\nMy favorite genre of music has evolved into the Blues because of the feeling and expression. However, my favorite artist, Bob Dylan, represents a far different genre. His music stands out beginning in my high school years and continues through today. Aside from his early acclaim, I also have additional ties. He attended the same high school as I did, though he preceded me by a few years. I also remember going with my mom to his father’s appliance store. Also, my mom played bridge with his mother occasionally. You must appreciate the hometown boy doing good. My favorite Dylan song, “Lay Down Your Weary Tune”, is a bit obscure but quite poetic.\n\n3. What is your favorite restaurant?\nMaria’s Taco Truck at the corner of Kings Canyon and Clovis has great food. It also make me think as I pass by, do I want to go home tonight and cook a dinner or just pick up a plate of tacos and not have to clean the kitchen?\n\n4. What would your perfect vacation entail?\nA nice long cinematic sunset with beautiful mountains or desert surrounding me. Then a clear moonless night, not too cold outside, to watch the constellations twist through the night sky. Then watch a great sunrise warming the outside, while sipping a cup of coffee.\n\n5. When you’re feeling down, what do you do to make yourself feel better?\nWhen I am feeling down, I just try to keep myself moving forward. I attempt to learn something new or to get out into the shop to build, create or restore things. Also volunteering gets me active.\n\n6. What is your favorite hobby?\nDuring my teens, I learned handiwork for fixing and painting houses and did yardwork jobs. At the same time, I volunteered my time to build, paint, light and setup sound on theatre stages. Oddly my hobby is building, painting, electrical, sound and gardening which is also the work I did most of my adult life.\n\n7. What is your favorite movie and why?\nTender Mercies with Robert Duvall and Tess Harper is my favorite movie. It explores the depth of the human condition and rebuilding of one’s life. With regards to the block buster movie franchisees, Lord of the Rings is the top of my list.\n\n8. What is a pet-peeve of yours?\nMy pet peeve is watching people being so attached to their phones. But what can I say since I must stare at a screen to edit in Premiere?\n\nWisdom would be my superpower, with the ability to wisely pass it on for others to use and learn.\n\n10. How has CMAC been a positive influence in your life?\nI had the experience of working with so many wonderful volunteers who have the passion to produce and tell stories to the community. I also had the pleasure of being on the Board as a member representative for one term, which provided additional insight into the workings of CMAC and the staff. I cannot thank enough the folks who have volunteered to run cameras at local music events and given me the opportunity to produce shows featuring music.\n\nPosted: June 2nd, 2019 / Updated: 7 months ago\n\nSocial Media\nCMAC on Facebook  CMAC on Twitter  CMAC on YouTube  CMAC on Instagram\nEmail Updates", "pred_label": "__label__1", "pred_score_pos": 0.5505581498146057} {"content": "The excited state dynamics of silver atoms embedded in helium nanodroplets have been investigated by a variety of spectroscopic techniques. The experiments reveal that 5p 2P1/2 ← 5s 2S1/2 excitation of embedded silver atoms results almost exclusively in the ejection of silver atoms populating the 2P1/2 state. In contrasts, excitation to the 5p 2P3/2 state leads to the ejection of not only silver atoms in the 2P1/2, 2P3/2 and 2D5/2 excited states but also of AgHe and AgHe2. These AgHe exciplexes are mainly formed in the A 21/2 electronic state. In addition, it is found that a considerable fraction of the 2P3/2 excited silver atoms becomes solvated within the helium droplets, most probably as AgHe2. The observations can be accounted for by a model in which the metastable 2D5/2 state of silver acts as a doorway state.", "pred_label": "__label__1", "pred_score_pos": 0.9924474954605103} {"content": "Mpungirehe Jean Baptiste\n\nMpungirehe Jean Baptiste is 29 years old, married and a father of two beautiful kids. From an early age, he knew he wanted to be an artist but the dream became a reality in 2007 after his role model and friend, Collin - the founder of Ivuka Arts Centre - encouraged him to join the organization. From the opening of Ivuka Arts, JB has been painting to share people's stories and emotions. Through his artworks, he wants to show how everyone is unique and has their own life path in life. He is a traveler that is inspired by the world he observes; he shares his feelings to create beauty through his work. He also believes that through painting we can all travel in space and time, and heal our minds. His artworks are influenced in part by his childhood, as well as through the influences of his fellow artists, friends, and everyday life on the streets of Kigali. Mpungirehe loves the thrill of painting and hopes that his work inspires others to discover their own artistry.", "pred_label": "__label__1", "pred_score_pos": 0.9919280409812927} {"content": "Hot Student Stories\n\nAn income is measured as\n\nAnnie Barnes\n\nin Social studies\n\n1 answer\n\n1 answer\n\nBethany Evans on January 14, 2018\n\nIncome is measured as \"an amount that is received in a specific period of time.\"The rent is the use and investment of the funds of opportunity picked up by a substance within a predetermined time of the award, or, in other words in money related terms. However, for the family units and the people, \"the wage is the totality of the considerable amount of the salaries, wages, benefits, premiums, fees, rents, and the different types of income in a given moment of time.\" In the field of opening up the financial aspects, the term may refer to the gathering of both tax and non-cash, related to the use of the capacity, with the previous money (money) that is being used as an intermediary for the aggregate wage.\n\nAdd you answer", "pred_label": "__label__1", "pred_score_pos": 0.5766501426696777} {"content": "Question: What Does The Color Blue Say About Your Personality?\n\nWhat is the real color of love?\n\nredThroughout history, red has been the color of passion, romance, and sexual energy.\n\nRed lips and blushed cheeks stimulate arousal.\n\nA red dress attracts attention and captures the imagination..\n\nCan colors tell your personality?\n\nAccording to proponents of color psychology, your favorite color (or colors) define your personality color. Yes, it’s that simple! According to them, the colors you choose say a lot about your physical, mental, and emotional states. Similarly, the colors you dislike say a lot about your weaknesses and vulnerabilities.\n\nWhat do you call a person who loves blue color?\n\nI’m going to coin the word “caeruleaphile”, or “caeruleophile”, which derives its prefix from the Latin word for blue, caeruleus, (also caerulea, caeruleum) and its suffix from the Greek -phile, meaning love.\n\nHow do you communicate with a blue personality?\n\nPersonality Type: Cool BlueBe clear.Give time for reflection.Time to prepare.Provide detail in writing.Remain focused.Agenda before and summary after.Start with info and context.Ask lots of questions especially why’s.More items…\n\nWhat colors make you feel?\n\n—Warm colors. Red, orange and yellow are next to each other on the wheel and are all warm colors. Warm colors often evoke feelings of happiness, optimism and energy. … Happy colors. Happy colors are bright, warm colors like yellow, orange, pink and red. … Calming colors. Cool colors like blue and green can make you feel calm.\n\nWhat is yellow personality?\n\nYELLOW personality traits YELLOWS are the life and soul of the party, they are sociable, expressive, very imaginative and enthusiastic with it. YELLOWS are very informal, very optimistic and animated. Their imaginations can sometimes run away with them as they are very fast paced thinkers.\n\nWhat is a red personality type?\n\nReds: are strong leaders, fast paced thinkers, risk takers, purposeful, drivers, strong-willed, high energy, competitive and rational. You may recognise many of the qualities in many leaders as they take ownership, need to be fast paced in their thinking, take risks and be purposeful and confident with it.\n\nWhat kind of person likes blue?\n\nIf blue is your favorite color you love harmony, are reliable, sensitive and always make an effort to think of others. You like to keep things clean and tidy and feel that stability is the most important aspect in life. Green. Those who love the color green are often affectionate, loyal and frank.\n\nWhat emotion does the color blue represent?\n\n\nWhat is True Colors personality test?\n\nTrue Colors is a personality profiling system created by Don Lowry in 1978. It was originally created to categorize four basic learning styles using the colors blue, orange, gold and green to identify the strengths and challenges of these core personality types.\n\nWhat personality is green?\n\n\nWhat does blue mean personality?\n\nThose with Blue color personality strengths tend to be enthusiastic, sympathetic, communicative, compassionate, idealistic, sincere and imaginative. They care and want to contribute to everything they are a part of. Relationships are important to blues.\n\nWhat are the 4 personality colors?\n\n\nWhy do I like the color blue?\n\nBlue is closely associated with harmony and peace. It is a color that evokes trust, honesty, loyalty and confidence. It reduces stress and creates a sense of relaxation, tranquility and calm. … According to Color Wheel Pro, “light blue is associated with health, healing, tranquility, understanding, and softness.\n\nWhat colors mean about you?\n\nThe most common associations made between colors and traits are these: the color meaning for red is passion and confidence; yellow for kindness and happiness; blue for loyalty and maturity; green for stalwartness and peace; black for distance and cool headedness; white for youth and innocence; and purple for wealth or …\n\nWhat is the Gold personality type?\n\nThose with Gold color personality strengths tend to be loyal, dependable, organized, thorough, sensible, punctual and caring. They notice and remember facts, like directions and instructions, set deadlines and want them to be met. They enjoy check lists and checking things off the list.", "pred_label": "__label__1", "pred_score_pos": 0.9969132542610168} {"content": "Episode 104\n\nAllyn Pierce\n\nNoBraking published on\n\nBefore you listen to this episode we need to take a step back and understand what happened in Northern California in 2018. If you are from the West Coast, or even anywhere in the United States, you more than likely already know of what now appears to be \"regular\" fire seasons. At the time the ‘Camp Fire’ was the deadliest wildfire in California history. The towns of Paradise and Concow were almost completely destroyed, each losing about 95% of their structures, while the towns of Magalia and Butte Creek Canyon were also largely destroyed. Paradise is around 50 miles north of the California state capital, Sacramento.\n\nI was connected to Allyn Pierce by Nick Ashby from Rockstar Garage. You might remember Allyn, moreso probably his Toyota Tundra, better known as Pandra due to his experience of surviving the 2018 Paradise Fire that devastated the city of Paradise, California. Pierce works in healthcare by day as a nurse but will forever be remembered for his bravery and astonishing heroics. His story which is remembered through social media is the life-affirming tale of real heroism in the face of what felt a certain death.\n\nI caught up with Allyn two years after the experience to talk about how extraordinary things have happened to someone who considers themself to be just a regular guy. It is an opportunity to see from Allyn's perspective the changes that have come about through all of this.\n\nMake sure to follow us and subscribe! @NoBraking\n", "pred_label": "__label__1", "pred_score_pos": 0.6800283193588257} {"content": "Operations Management – Lean Techniques\nJanuary 14, 2021\nOperations Management Questions\nJanuary 14, 2021\n\nthe worst mass shootings in history\n\nDiscussion Board Topic: Chronic Juvenile Offenders\n\nJames Holmes committed one of the worst mass shootings in history. The accused movie theatre shooter killed 12 people and injured 50 when he opened fire in a movie theatre on July 20, 2012 during the premier of the Dark Knight Rises. According to his lawyer, mental illness was the reason why Holmes opened fire. Prosecutors argued that mental illness should not be used to protect a mass murderer from punishment.\nHolmes was sentences to 12 life sentences in prison without the possibility of parole.\n\nyou will assume the role of the Defense Lawyer. Your job is to argue that your client should not receive the death penalty and that his mental illness should be taken into consideration for a more lenient sentence. Your job is to humanize your client and to bring up issues of family, mental health, and more appropriate options.\n\n\nand also please respond to this students post- 50 words each respond\n\n1)Nickolas/ I think the opposite but I am forced to argue against myself here. Biological factors cannot be an explanation for disruptive or criminal behavior because of the contemporary trait theory, which states that it is not a single biological or psychological attribute that can explain criminality, and that each offender is to considered physically and mentally unique, therefore there must be different explanations for criminal or disruptive behavior. I think that if the foods we ate really contributed to disruptive or criminal behavior, than the majority of the children that eat poor high sugar/fat diets would be disruptive and potential criminals. This just isn’t true, and on the opposite end of the spectrum a perfect diet does not guarantee one will never be disruptive or have a criminal disposition.\n\n2) jorge/ Biological factors can not be a explanation for criminal behaviors. Correlation does not equal causation. Just because certain factors as sugar imbalance is a correlated to criminal behavior, it does mean its the cause for it. Criminals are criminals because they choose to be. They can only blame themselves, not find a excuse for their behavior. There is no need to remove sugar from schools, or change the diets at school for the reason of criminal behavior. If we remove certain foods, it shall be for health reasons.\n\nUse the following coupon\n\nOrder Now\n\nPlace Order\n\n\nChat with us on WhatsApp", "pred_label": "__label__1", "pred_score_pos": 0.8343923091888428} {"content": "Islam 101\n\nIslam 101, by Gregory M. Davis. Long article meant to help people become better educated about the fundamentals of Islam and to help the more knowledgeable better convey the facts to others. Concise explanations of the major moving parts of Islam and their implications for Western society. Also as a pdf.\n\n\n\n\nBetter change course or we’re screwed.", "pred_label": "__label__1", "pred_score_pos": 0.9998415112495422} {"content": "Unscramble Your Words\n\n\n\n\nSUE 3 letter word which starts with the letter S and ends with the letter E\n\nWe have found 9 definitions.\n\n(v. t.) To follow up; to chase; to seek after; to endeavor to win; to woo.\n(v. t.) To seek justice or right from by legal process; to institute process in law against; to bring an action against; to prosecute judicially.\n(v. t.) To proceed with as an action and follow it up to its proper termination; to gain by legal process.\n(v. t.) To clean as the beak; -- said of a hawk.\n(v. t.) To leave high and dry on shore; as to sue a ship.\n(v. i.) To seek by request; to make application; to petition; to entreat; to plead.\n(v. i.) To prosecute; to make legal claim; to seek (for something) in law; as to sue for damages.\n(v. i.) To woo; to pay addresses as a lover.\n(v. i.) To be left high and dry on the shore as a ship.\n\nSyllable Information\n\nThe word SUE is a 3 letter word that contains 1 syllable .\n\nThe syllable division for the word SUE is SUE\n\nOther words from SUE\n\nBelow you will find all the words that can be formed from the letters of the word SUE.", "pred_label": "__label__1", "pred_score_pos": 0.8175846338272095} {"content": "Around the World\n\nDistance between Newark and Converse\n\nDistance from Newark, NJ to Converse, TX is 1561 miles / 2513 kilometers and driving distance is 1798 miles or 2894 kilometers. Travel time by car is about 31 hours 3 minutes.\n\nMap showing the distance from Newark to Converse\n\nBeeline Air distance: miles km\nDriving line Driving distance: miles km\n\nNewark, NJ\n\nCity: Newark, NJ\nCountry: United States\nCoordinates: 40°44′8″N\n\nConverse, TX\n\nCity: Converse, TX\nCountry: United States\nCoordinates: 29°31′4″N\n\nTime difference between Newark and Converse\n\nThe time difference between Newark and Converse is 1 hour. Converse is 1 hour behind Newark. Current local time in Newark is 13:58 EST (2021-01-18) and time in Converse is 12:58 CST (2021-01-18).", "pred_label": "__label__1", "pred_score_pos": 0.9811570048332214} {"content": "Philosophy of public health\n\nWhat is public health philosophy?\n\nAt its core, public health is concerned with promoting and protecting the health of populations, broadly understood. Promoting and protecting the health of populations often involves or requires coordinated action on the part of governments.\n\nWhat are the core values and philosophy of public health?\n\nPrinciples of Public Health Practice/ What are the core values underlying public health ? In this topic we are looking at some of the values that underpin public health practice such as: equity, social justice, participation, efficiency, effectiveness, acceptability, affordability and accessibility.\n\nWhat is a philosophy of health?\n\nThe philosophy of healthcare is the study of the ethics, processes, and people which constitute the maintenance of health for human beings. This perennial concern is especially prominent in modern political liberalism, wherein health has been understood as the foundational good necessary for public life.\n\nWhat is the focus of public health?\n\nIn public health , the focus is on health promotion and disease/injury prevention, in contrast to the medical model of care, which focuses more heavily upon diagnosing and treating illnesses and conditions after they occur. Focusing on prevention and the population public health is a distinct and ever-changing field.\n\nWhat are the 10 essential functions of public health?\n\n10 Essential Services of Public Health Monitor health status to identify and solve community health problems. Diagnose and investigate health problems and health hazards in the community. Inform, educate, and empower people about health issues. Mobilize community partnerships and action to identify and solve health problems.\n\nYou might be interested:  What does philosophy mean\n\nWhat is the core function of public health?\n\nThis page and graphic show how the ten essential environmental health services align with the three core functions of public health (assessment, policy development, and assurance).\n\nWhat are the public health values?\n\nIn a review of 13 public health ethics frameworks published through 2010 several foundational values for the field of public health emerged, including an obligation to prevent harm and protect health, respect for individuals, least infringement, trust , transparency, confidentiality, production of benefits, justice , and\n\nWhat are the principles of public health?\n\nThis approach – focusing on the application of seven mid-level principles to cases (non-maleficence, beneficence, health maximisation, efficiency, respect for autonomy, justice, proportionality) – is presented in this paper. Easy to use ‘tools’ applying ethics to public health are presented.\n\nWhat are the principles of public health ethics?\n\nThe four principles of beneficence , nonmaleficence , justice, and respect for autonomy do not provide an exhaustive account of how the principles can be used as a framework for moral reasoning in biomedicine or public health [11].\n\nWhat is your philosophy in life?\n\n\nWhat is your philosophy of medicine?\n\nThe philosophy of medicine seeks to establish and describe what medicine is, what it should do, and how it should do it. In other words, it provides the ideals, practicalities, and intellectual and applied ends of medicine as a human activity.\n\nYou might be interested:  Teaching philosophy journal\n\nWhat philosophy means?\n\nPhilosophy (from Greek: φιλοσοφία, philosophia, ‘love of wisdom’) is the study of general and fundamental questions, such as those about reason, existence, knowledge, values, mind, and language. Philosophical methods include questioning, critical discussion, rational argument, and systematic presentation.\n\nWhat are examples of public health?\n\nExamples of public health efforts include educating the public about healthier choices, promoting physical activity and fitness, preventing disease outbreaks and the spread of infectious diseases, ensuring safe food and water in communities, preparing for emergency, preventing injury, treating water with fluoride for\n\nWhat are the six disciplines of public health?\n\nThe core public health disciplines include biostatistics, epidemiology, health policy and management, social and behavioral sciences, and environmental health sciences.\n\nWhat are the four components of public health?\n\n4 Essential Components of Population Health Management Strategic. Communities need to define their priority issues. Structural. An entity such as a community health management system needs to select the priorities, make decisions and create a community-wide population health learning system. Cultural. Technical.\n\nLeave a Reply\n", "pred_label": "__label__1", "pred_score_pos": 0.9629815220832825} {"content": "Workers' Compensation Representation FromA Former Workers' Compensation Defense Attorney\n\nFatal workplace injuries a serious concern for California workers\n\nWhen a person suffers an injury on the job, he or she has the right to pursue benefits through a workers’ compensation claim. Even knowing that benefits are available in case of a workplace accident, a worker may still have concerns about his or her health and safety while on the job. Since 2014, fatal workplace injuries are up by 22%, which means that California employees have a good reason to be concerned. \n\nIt is always tragic when a person dies on the job, regardless of why it happened. When these events occur, employers should strive to investigate the cause of the accident and implement steps to ensure that it does not happen again. There is no clear reason why the rate of work-related fatalities continues to rise in the state, although it is lower than the national average.\n\nExisting regulations are designed to protect the safety and well-being of men and women who work in various types of jobs. Despite regulations and enforcement, fatal accidents continue to be a concern, particularly among Latino workers. There are probably multiple factors that play a role in this, and Cal/OSHA pledges to continue to study the problem and increase awareness.\n\nWorkers’ compensation insurance covers workplace injuries, but it also offers support to grieving California families. If a loved one was killed in a work accident, surviving dependents have the right to pursue death benefits through an insurance claim. It is not always easy to secure these benefits, and a person considering a claim may want to work with an experienced attorney from the very beginning of the process.", "pred_label": "__label__1", "pred_score_pos": 0.9483116269111633} {"content": "Journals in a Remote Learning Environment\n\nJournals play a key role in a Facing History classroom, whether the learning is in person or remote. Many students find that writing or drawing in a journal helps them process ideas, formulate questions, and retain information. Journals make learning visible by providing a safe, accessible space for students to share thoughts, feelings, and uncertainties. They also help nurture classroom community and offer a way for you to build relationships with your students through reading and commenting on their journals. And frequent journal writing helps students become more fluent in expressing their ideas in writing or speaking.\n\nFor guidelines on using journals to support learning, read the teaching strategy Journals in a Facing History Classroom, as well as the tips included in Student Journaling During Coronavirus. In addition, educators who are teaching in remote or hybrid learning environments should consider these questions:\n\n 1. How can journaling benefit students during distance or hybrid learning?\n\n Journals provide students with a space for private reflection, which can help them process their thoughts and feelings through the uncertainty of these times. Journaling can be a helpful routine to consistently include if students are moving between distance and in-person learning so that they can maintain continuity in their learning. In addition, students may benefit from having added opportunities to reflect individually before participating in remote discussions.\n\n Not all students are equally comfortable sharing during remote sessions. Beginning a discussion with journaling can help students organize their thoughts and feelings and plan what contributions they would like to make.\n\n 2. What format should students’ journals use? How should students share journal entries when learning is taking place outside of school?\n\n Consider whether you would like students to use physical or digital journals. How will the format students use for their journals affect how they include illustrations, images, or other creative responses? In a digital journal, it may be easier for students to include outside images or excerpts from a text, but in a physical journal, it may be easier for students to include their own illustrations.\n\n If you are transitioning between remote and in-person instruction, it may be helpful for students to use the same format in both settings in order to maintain consistency, and students should be able to access their journals in both settings. You should also consider how the format of students’ journals will affect how they share entries with you or their classmates. For example, if students keep a physical journal while they are learning remotely, they could share photos of entries or excerpts in their written work or discussions.\n\nThis Teaching Strategy is part of our Back to School 2020 Resources Collection\n\nBuilding Community for Connection and Learning\n\nRelated Content\n\nTeaching Strategy\n\nJournals in a Facing History Classroom\n\nCreate a practice of student journaling to help students critically examine their surroundings and make informed judgments.\n\nTeaching Strategy\n\nContracting for Remote Learning\n\n\nTeaching Strategy\n\nLearn to Listen, Listen to Learn\n\nStructure a discussion that uses journaling and group work to strengthen students’ listening skills.\n\n\nConfronting the Suffering Caused by the Nazis\n\nStudents use journaling and group discussion to respond to emotionally-challenging diary entries of a Jewish teenager confined in a Nazi ghetto.\n\nSearch Our Global Collection\n", "pred_label": "__label__1", "pred_score_pos": 0.9974926710128784} {"content": "Dr.-Ing. Malte Stonis\n\nDoctoral thesis\n\nDefects like folds can arise using forging for the production of long flat pieces made of aluminium. A special defect is the formation of inner folds. These can be seen in the grain flow. Inner folds have a negative effect on the dynamic properties of the forged part. As a production process, forging can be divided into single-directional and multi-directional forging. The formation of inner folds was observed at the single-directional forging. By using the multi-directional forging, a forming operation working from different directions, the forming can be set variably. Thus the development of folds can be prevented. A newly developed method can help in the selection of the forming process and in determining an appropriate tool geometry. Here especially the area is adapted, where the development of inner folds occur. Therefore a calculation model was developed. It integrates a computer-aided identification of the inner folds. Using this model, a correction of the parametrically constructed forging tool is possible.\n\nmultidirectional-forging, long flat pieces, aluminium, fibre orientation\n\n\nTo be able to meet the challenges of globalization, the optimization of internal transport is becoming increasingly important. Due to the further development, drones are an innovative material handling technology. The use of drones can be cost-efficient, especially for time-critical transport tasks. However, drones are characterized by a very low payload and very high operating costs. Therefore drones are in some cases more economical than conventional means of transport, but they do not offer an universal solution for all internal transport tasks.\n\ndrones, intralogistics, transport, transport systems, economic efficiency\n\nThe service life of rolling contacts is dependent on many factors. The choice of materials in particular has a major influence on when, for example, a ball bearing mayfail.Within an exemplary process chain for the production of hybrid high-performance components through tailored forming, hybrid solid components made of at least two different steel alloys are investigated. The aim is to create parts that have improved properties compared to monolithic parts of the same geometry. In orderto achievethis, several materials are joined prior to a forming operation. In this work, hybrid shafts created by either plasma(PTA)orlaser metal deposition (LMD-W) welding are formed via cross-wedge rolling(CWR)to investigate the resulting thickness of the material deposited in the area of the bearing seat. Additionally,finite element analysis (FEA)simulations of the CWRprocessare compared with experimental CWR results to validate the coating thickness estimation done via simulation. This allows for more accurate predictionsofthe cladding materialgeometry after CWR,and the desired welding seam geometrycan be selected by calculating the cladding thicknessvia CWR simulation.\n\nCross-Wedge Rolling, Forming, hybrid, tailored forming\n\nTo manufacture semi-finished hybrid workpieces with tailored properties, a finite element simulation assisted process chain design was investigated. This includes the process steps of cross wedge rolling, hot geometry inspection, induction hardening, and fatigue testing. The process chain allows the utilisation of material combinations such as high-strength steels with low-cost and easy to process steels. Here, plasma transferred arc welding is applied to supply the process chain with hybrid specimen featuring different steel grades. An overview of the numerical approaches to consider the various physical phenomena in each of the process steps is presented. The properties of the component behaviour were investigated via the finite element method (FEM) and theoretical approaches.\n\nCross-Wedge Rolling, Forming, hybrid, tailored forming\n\nIn this work we present an application of the virtual element method (VEM) to a forming process of hybrid metallic structures by cross-wedge rolling. The modeling of that process is embedded in a thermomechanical framework undergoing large deformations. Since forming processes include mostly huge displacements within a plastic regime, the difficulty of an accurate numerical treatment arises. VEM illustrates a stable, robust and quadratic convergence rate under extreme loading conditions in many fields of numerical mechanics. Numerically, the forming process is achieved by assigning time-dependent boundary conditions instead of modeling the contact mechanics yielding to a simplified formulation. Based on the two metallic combinations of steel and aluminum, different material properties are considered in the simulations. The purpose of this contribution is to illustrate the effectiveness of such a non-contact macroscopic framework by employing suitable boundary conditions within a virtual element scheme. A comparison with the classical finite element method (FEM) is performed to demonstrate the efficiency of the chosen approach. The numerical examples proposed in this work stem out from the DFG Collaborative Research Centre (CRC) 1153 “Process chain for the production of hybrid high-performance components through tailored forming”.\n\nsimulation, FEM, bulk metal forming, tailiored forming\n\nHandling hot steel parts weighing several kilos is physically demanding. A new type of forging tongs is designed to reduce stress at work, prevent pain and reduce sick leave.                             \n\nforging, ergonomic, stress reduction\n\nThe selection of storage, commissioning and transport systems (sct systems) is very complex due to the large number of available systems on the market and influencing factors. One important influencing factor is automation. To classify the degrees of automation of sct systems and to determine the individually required automation a method is proposed below.\n\nautomation, storage, commissioning and transport systems\n\nUpfront investment costs for the tooling of injection molds are the basis for deciding if a mold is tooled and hence if a part is viable for mass-production. If tooling costs are too high, a product may not viable for production. If tooling costs are estimated too low by the tool shop, contract implications may arise.\nThe goal of this research is to develop a method with humanlike quotation accuracy, achieve standardization, factor in historic quotation data and shorten quotation process times. The machine learning approach developed is based on geometry data of parts and additional meta-information.\n\ninjection molding, tooling, industry 4.0\n\nThe aim of subproject B1 of the Collaborative Research Center (CRC) 1153 is to determine the formability of novel hybrid semi-finished products by means of incremental forming cross wedge rolling. Main aspect is the forming of hybrid semi-finished products made of steel, aluminium and hard material alloys. In order to reduce the component weight, the use of hybrid semi-finished products makes it possible to manufacture less stressed segments of a previously monolithic component from a light metal. To increase wear resistance, a component area (e.g. a bearing seat) can be coated with a hard material. In addition, process variables (e.g. temperature and force) are to be measured in contact between work piece and tool in the future. There are primarily two material arrangements for the semi-finished products used: coated (coaxial - demonstrator shaft 1) and joined at the front (serial - demonstrator shaft 3). One challenge is the heating of the semi-finished products necessary for forming, since the hybrid semi-finished product has different flow resistances due to the different materials and may have to be heated inhomogeneously in order to enable uniform forming.\n\ncross-wedge rolling, forming, hybrid work pieces, tailored forming, hybrid semi-finished products\n\nQuality assurance methods are a central success factor for the further industrialization of additive manufacturing. This paper presents an approach for an optical inspection system that controls the quality of additive material extrusion layer by layer. The inspection task gets analyzed, hardware components for data acquisition are designed and a first step towards texture-analytical detection of defects is presented.\n\nadditive manufacturing, 3d printing, material extrusion, fused deposition modeling, image processing\n\nTo this day, the design of preforms for hot forging processes is still a manual trial and error process and therefore time consuming. Furthermore, its quality vastly depends on the engineer’s experience. At the same time, the preform is the most influencing stage for the final forging result. To overcome the dependency on the engineer’s experience and time-consuming optimization processes this paper presents and evaluates a preform optimization by an algorithm for cross wedge rolled preforms. This algorithm takes the mass distribution of the final part, the preform volume, the shape complexity, the appearance of folds in the final part and the occurring amount of flash into account. This forms a multi-criteria optimization problem resulting in large search spaces. Therefore, an evolutionary algorithm is introduced. The developed algorithm is tested with the help of a connecting rod to estimate the influence of the algorithm parameters. It is found that the developed algorithm is capable of creating a suitable preform for the given criteria in less than a minute. Furthermore, two of the five given algorithm parameters, the selection pressure und the population size, have significant influence on the optimization duration and quality.\n\npreform optimization, genetic algorithm, cross wedge rolled, adaptive flash\n\nA product-dependent, individual process development represents a main cost driver in laser material processing. Therefore, the expert system SmQL is being developed in an FQS-funded project, in which process knowledge can be stored in a formalized form and represented in rule form. This is intended to minimize times for setup processes and secure knowledge in the company in the long term.\n\nexpert system, industry 4.0, laser materials processing\n\nThe Hybrid Forging Process satisfies the needs of modern structural and material lightweight engineering by combining forming and mechanical joining operations within one process. This paper presents an analytical approach for the prediction of symmetrical joining bonds of bulk material and sheet metal. Finite element simulations verify that the analytical approach provides a threshold value for the sheet metal thickness at which the bending elongation is reduced significantly. Furthermore, the analytical approach emphasizes that surpassing the threshold value leads to a saturation of the bending elongation reduction and only marginal benefit is achieved by increasing the sheet metal thickness.\n\nhybrid forging, bonding, joining, elastomechanics, lightweight, multi-material manufacturing\n\nMaterial transports in production facilities are subject to constant change. Production batch sizes are becoming smaller and a trend towards batch size 1 is becoming apparent. For this reason, a new research project is examining drones respectively unmanned aerial vehicles (UAV) as so far rarely used transport technology for possible applications in intralogistics. Barriers to use UAV and risks during its use are categorized and evaluated. In the following, requirements for the operating environment and the technical equipment itself are derived from this. Overall, it is investigated to what extent UAV can be integrated into the operational infrastructure of companies in certain use cases and whether the resulting change in logistics performance justifies its use cost-effectively.\n\ndrones, material transport, requirements, economic efficiency\n\nComponents manufactured by hybrid forging in progressive dies have a high potential for lightweight construction. The example of a suspension arm shows the advantage of hybrid forged parts creating new possibilities for structural and material lightweight construction. Additionally, it is demonstrated that the heat subjected to hybrid forged parts during the subsequent hardening process does not threaten the potential of material lightweight construction.\n\nprogressive compound, hybrid, forging\n\nDriverless transport systems are a building block for more efficient production systems in intralogistics, but have weaknesses in human-machine interaction. In a complex research project, a voice-based assignment is being developed, among other things, which is intended to make human-machine interaction more intuitive and increase its acceptance.\n\nautomated guided vehicle, augmented reality, smart glasses, voice control\n\nBelt conveyor systems are an excellent way of conveying bulk material. With increasing load and transport distance, these systems become larger and energy efficiency becomes an important factor. Rollers are an integral part of belt conveyor systems. The running behaviour of idlers during operation has an impact on the energy efficiency of the entire system. The development of driven idlers is seen as one way to reduce the energy consumption of belt conveyor systems. This contribution shows that the investigation of conventional and driven idlers under different conditions is necessary and that a test rig for the investigation of these idlers has been developed at the Institut für Integrierte Produktion Hannover.\n\nidlers, rollers, driven idler, bulk material handling\n\nThe Collaborative Research Centre 1153 (CRC 1153) “Process chain for the production of hybrid high-performance components through tailored forming” aims to develop new process chains for the production of hybrid bulk components using joined semi-finished workpieces. The subproject B1 investigates the formability of hybrid parts using cross-wedge rolling. This study investigates the reduction of the coating thickness of coaxially arranged semi-finished hybrid parts through cross-wedge rolling. The investigated parts are made of two steels (1.0460 and 1.4718) via laser cladding with hot-wire. The rolling process is designed by finite element (FE)-simulations and later experimentally investigated. Research priorities include investigations of the difference in the coating thickness of the laser cladded 1.4718 before and after cross-wedge rolling depending on the wedge angle, cross-section reduction, and the forming speed. Also, the simulations and the experimental trials are compared to verify the possibility of predicting the thickness via finite element analysis (FEA). The main finding was the ability to describe the forming behavior of coaxially arranged hybrid parts at a cross-section reduction of 20% using FEA. For a cross-section reduction of 70% the results showed a larger deviation between simulation and experimental trials. The deviations were between 0.8% and 26.2%.\n\ncross-wedge rolling, hybrid forming, FEA, coating thickness\n\nWithin the Collaborative Research Centre (CRC) 1153 “Tailored Forming “the manufacturing of hybrid bulk components is investigated. Therefore, a process chain consisting of joining, forming, milling and quality control has been established by multiple subprojects.Within subproject B1 of the CRC forming of hybrid parts by the incrementally forming cross-wedge rolling (CWR) process is investigated. The superior aim is to determine process limits and capabilities, when forming parts consisting of different materials joined by varying technologies.\n\nIn this paper, the investigation of cross-wedge rolling of serially arranged hybrid parts made of steel and aluminum is described. The focus of the research presented in this publication is the displacement of the joining zone of hybrid parts due to the cross-wedge rolling process. Therefore, finite element simulations have been developed, that allow the investigations of hybrid solid components. After simulation of various variations of the cross-wedge rolling process, i.e.  differently shaped tools and forming velocities, experimental trials were carried out with identical parameter sets. A comparison of simulation and experiment, showed that the simulation model is capable of describing the cross-wedge rolling process of hybrid parts. The standard deviation of the displacement of the joining zone between simulation and experimental trials is 8.8% with regard to all investigated cases.\n\ntailored forming, cross-wedge rolling, material forming, aluminum, steel\n\nWithin the Collaborative Research Centre 1153 “Tailored Forming“ a process chain for the manufacturing of hybrid high performance components is developed. Exemplary process steps consist of deposit welding of high performance steel on low-cost steel, pre-shaping by cross-wedge rolling and finishing by milling.\nHard material coatings such as Stellite 6 or Delcrome 253 are used as wear or corrosion protection coatings in industrial applications. Scientists of the Institute of Material Science welded these hard material alloys onto a base material, in this case C22.8, to create a hybrid workpiece. Scientists of the Institut für Integrierte Produktion Hannover have shown that these hybrid workpieces can be formed without defects (e.g. detachment of the coating) by cross-wedge rolling. After forming, the properties of the coatings are retained or in some cases even improved (e.g. the transition zone between base material and coating). By adjustments in the welding process, it was possible to apply the 100Cr6 rolling bearing steel, as of now declared as non-weldable, on the low-cost steel C22.8. 100Cr6 was formed afterwards in its hybrid bonding state with C22.8 by cross-wedge rolling, thus a component-integrated bearing seat was produced. Even after welding and forming, the rolling bearing steel coating could still be quench-hardened to a hardness of over 60 HRC. This paper shows the potential of forming hybrid billets to tailored parts. Since industrially available standard materials can be used for hard material coatings by this approach, even though they are not weldable by conventional methods, it is not necessary to use expensive, for welding designed materials to implement a hybrid component concept.\n\ntailored forming, cross-wedge rolling, hard material coatings, PTA\n\nWithin the Collaborative Research Centre (CRC) 1153 Tailored Forming a process chain for the manufacturing of hybrid high performance components is developed. Exemplary process steps consist of deposit welding of high-performance steel onto low cost steel and pre-shaping the component by cross-wedge rolling (CWR), supported by an optical quality control system. A combination of a fringe projection profilometry setup with a thermal imaging camera is used to monitor the components before and after the CWR process. Both geometry and thermal imaging data are combined, assigning temperature values to 3D data points.\nIn this paper, the acquisition of combined temperature-geometry data is described. The data before and after the CWR is compared to the input and the result data of the forming simulation that was used to design the CWR process. The comparison shows the quality and sustainability of the heating process as well as the influence of the transportation of the hot component prior to forming. Additionally, the accuracy of the used simulation model and software are evaluated by data examination. The examination shows the limits of idealised and simplified assumptions for the simulation, e.g., a homogeneous temperature distribution before forming or the modelling of the heat transfer on contact surfaces.\n\ntailored forming, cross-wedge rolling, material forming, aluminum, steel, optical measurement\n\nJob offers\n\n • Industry 4.0, Artificial Intelligence\n\n Student job, Master thesis, Bachelor thesis, Project thesis, Internship\n\n Industry Dating Platform", "pred_label": "__label__1", "pred_score_pos": 0.980772852897644} {"content": "Taking the First Step to Safeguard LNG Storage Tanks from Earthquakes\n\nChris Hendrix, PE\n\nChris Hendrix explores the science of earthquakes, and how to ensure LNG storage tanks are seismically safe.\n\nShare this post\n\nNatural gas is a vital commodity and accounts for about a third of the United States’ total energy production. After natural gas is produced, it is liquified at extremely low temperatures (-260 °F) and shipped via tanker to U.S. terminals. Once into the U.S., this Liquefied Natural Gas (LNG) is distributed all over the country to local industrial facilities or gas plants where it is stored in tanks so that it may be vaporized and used whenever energy is needed.\n\nLast year, a series of earthquakes in Ridgecrest, CA caused over $1 billion in damage. Highways cracked, chimneys fell, and storage tanks were damaged. While not often reported, earthquakes present a major hazard to LNG storage tanks. Shifting of the tank and connections due to an earthquake could cause gas leakage and insulation loss, which could lead to a major explosion and disaster.\n\nNo matter where LNG tanks are located within the U.S., it is important that they are seismically designed, which is required by federal regulation. In fact, all large tanks, even if they don’t contain hazardous materials, are considered “nonbuilding structures” by the building code and require seismic design.\n\nThe science of earthquakes\n\nAn earthquake occurs when two tectonic plates slip past one another, releasing an enormous amount of energy. In fact, a Magnitude 6.0 earthquake releases the energy equivalent of an atomic bomb. This enormous energy creates waves that travel within the earth and along its surface. As these waves move, they:\n\n 1. Weaken (attenuate), similar to the rippling of waves caused by throwing a pebble in a pond\n 2. Amplify as they reflect and refract off different soil layers\n\nBecause seismic waves can both weaken and amplify as they travel, determining the earthquake motions at a site is a complicated task. A seismic engineer needs two things to determine this motion:\n\n 1. Geological location of the site (i.e. distance from known faults)\n 2. Soil conditions underneath the site (usually determined by a geotechnical engineer)\n\nThe first step in seismic design is determining this motion. For a standard building, a structural engineer would use design maps and average soil properties to determine the potential earthquake motion at the site. This is a quick method that usually yields conservative results. However, for important items, such as LNG storage tanks, a more comprehensive analysis is required.\n\nWhat is a Site-Specific Response Analysis?\n\nA site-specific response analysis (SSRA) is a more comprehensive way to determine the earthquake motion at site's ground surface and requires a specialized skillset and software. Some examples of structures for which SSRAs are required include:\n\n • LNG storage tanks\n • Nuclear power plants\n • Structures on soft clay\n\nTwo steps are required for an SSRA:\n\n 1. Determine the motion at the bedrock below the site. This is commonly referred to as the site’s seismic hazard and is determined based on probabilities and history of past nearby earthquakes.\n 2. Calculate the motion at the ground level by modelling the waves reflecting and refracting through the soil layers. This is typically performed with special software.\n\nLast year’s earthquakes at Ridgecrest demonstrate the importance of making our infrastructure seismically resilient. Our highly specialized structural/seismic safety team has the required skillset to ensure the design of LNG tanks meet the strict federal regulations and are seismically safe.\n\nStay up to date. Sign Up for the Blog\n\nMore blog posts from Jensen Hughes\n\n\nJan 15, 2021\n\n\nRead more\nWhy Cross-Train Fire Protection System Installers\n\nJan 6, 2021\n\n\nRead more\nHow Can Hospitals Use Artificial Intelligence (AI) to Respond to COVID-19\n\nDec 22, 2020\n\nAmidst the global pandemic, we’re seeing healthcare systems utilizing artificial intelligence (AI) to improve efficiency.\n\nRead more", "pred_label": "__label__1", "pred_score_pos": 0.872334897518158} {"content": "California Unveils New Budget Blueprint For 2021-2022 Fiscal Year\n\nA new state budget blueprint has been released for the 2021-22 fiscal year centered around restoring previous cuts while also providing a lifeline for Californians impacted by the pandemic. Assemblyman Phil Ting, Chair of the Assembly Budget Committee, says many cuts were the result of the federal government not providing additional funding.\n\nHe says other priorities include preparing for future economic downturns and providing targeted stimulus to help rebuild the economy.", "pred_label": "__label__1", "pred_score_pos": 0.9999983310699463} {"content": "Abkhaz and Uyghur Alphabets\n\nAdd ⊕\n1 Alphabets\n1.1 Alphabets in\n1.2 Alphabets\nTamil Alphabets\nRank: 36 (Overall)\nRank: 18 (Overall)\nIrish Alphabets\n1.3 Phonology\n1.3.1 How Many Vowels\nThai Alphabets\nRank: 1 (Overall)\nRank: 6 (Overall)\nHebrew Alphabets\n1.3.2 How Many Consonants\nHmong Alphabets\nRank: 36 (Overall)\nRank: 17 (Overall)\nGerman Alphabets\n1.4 Scripts\nArabic, Cyrillic, Latin\n1.5 Writing Direction\nRight-To-Left, Horizontal\nLeft-To-Right, Vertical, Top-To-Bottom\n1.6 Hard to Learn\n1.6.1 Language Levels\nArmenian Alphab..\nNot Available\nRank: N/A (Overall)\nRank: 4 (Overall)\nBengali Alphabets\n1.6.2 Time Taken to Learn\nChinese Alphabe..\n27 weeks\nRank: 8 (Overall)\n44 weeks\nRank: 11 (Overall)\nCebuano Alphabets\n\nAbkhaz vs Uyghur Alphabets\n\nWondering about the number of letters in Abkhaz and Uyghur alphabets? When you compare Abkhaz vs Uyghur alphabets you will understand the number of alphabets in both the languages. Because lesser the number of alphabets, faster the language to learn, find all the Easiest Languages to Learn. Abkhaz and Uyghur Alphabets are collection of symbols or letters used for writing. Abkhaz alphabets contain 62 letters and Uyghur Alphabets contain 36 letters. The writing direction of Abkhaz is Right-To-Left, Horizontal whereas the writing direction of Uyghur is Left-To-Right Vertical and Top-To-Bottom. Abkhaz and Uyghur Alphabets are the basics of Abkhaz and Uyghur languages. Check the detailed comparison of Abkhaz and Uyghur.\n\nAbkhaz and Uyghur Scripts\n\nCompare Abkhaz and Uyghur alphabets and find out scripts used by Abkhaz and Uyghur language. Abkhaz and Uyghur scripts are the methodology and rules for writing. Scripts used by Abkhaz and Uyghur languages are Cyrillic and Arabic, Cyrillic, Latin respectively. After learning alphabets in Abkhaz and Uyghur you can also learn useful Abkhaz greetings vs Uyghur greetings.\n\nAbkhaz Vowels vs Uyghur Vowels\n\nIf you are comparing Abkhaz and Uyghur alphabets then you need to find out Abkhaz vowels vs Uyghur vowels too. The number of vowels and consonants in Abkhaz are 2 and 60 and number of vowels and consonants in Uyghur are 9 and 27. Language codes are unique and are two or three letter codes assigned to each language. Check out all the language codes of Abkhaz and Uyghur language codes.\n\nIs Abkhaz Harder than Uyghur?\n\nIs Abkhaz harder than Uyghur? No language is hard or easy to learn as it depends on individual interest and efforts for learning that language. When you decide to learn any language, you need to find out time required to learn that language and levels in that language. As mentioned above, while comparing Abkhaz and Uyghur Alphabets the number of alphabets in any language decides hardness in learning that language.\n\nIt's important to know Abkhaz and Uyghur alphabets because for learning these languages, alphabets are the starting point. There are no levels in Abkhaz language. And time taken to learn Abkhaz language is 27 weeks. While the levels in Uyghur language are 5. And time taken to learn Uyghur language is 44 weeks.\n\nLet Others Know", "pred_label": "__label__1", "pred_score_pos": 0.8595386743545532} {"content": "allocacoc LightStrip Touch | Touch | Desk, Dimmable, Touch Strip Control, Slide to Adjust Brightness, LED Table Lamp (荷蘭品牌 allocacoc LightStrip Touch 8段光階手滑燈)\n\nSale price $126.00 Regular price $133.00\n\n\nThe LightStrip Touch has a unique way of controlling your light: slide along the top with your finger to illuminate more LEDs. This is a very natural feeling to adjust the light.\n\nFreer, adjustable light angles with a flexible and modular stand\n\nThe joint allows for more flexibility: you can freely adjust the angle of the lampstand to optimally light your working area. You can also adjust the direction of the beam, which enables you to use indirect light to create a warmer atmosphere.\n\nTransform it into an ambient light pillar\n\nWhen you swipe the touch bar you can slide it until all the LEDs are lit and transform it into a desk lamp. Other varieties are also possible: when you fully erect the lamp body and reduce the brightness it can be used as an ambient light column.\n\nModular design\n\nExtend the LightStrip with up to 2 extra LightStrips to create an extended desktop light or a unique hanging light.\n\nThe LightStrip is compatible with various modular fixtures and stands\n\nThe light strips can either be used standalone or combined and can be expanded to a maximum of three modules. With different brackets, they can be turned into wall lights, table lamps, bedside lamps, floor lamps or even chandeliers.\n\nHigh-grade aluminium body\n\nThe aluminium alloy body feels sturdy and lightweight while providing a qualitative look.\n\n荷蘭allocacoc LightStrip Touch 手滑燈不用開關按鍵的,開關、調光大小只需觸控, 2019年德國紅點設計獎!\n\n- 滑動觸控八段燈光\n- 可用作檯燈、床頭燈,也可以是情境燈\n- 可串聯使用,大桌面也完全沒問題\n- USB 便捷供電系統\n- 全角度變換設計\n- 可使用十年以上的 LED 燈組設計(無需換燈泡)\n- 全鋁合金外殼設計有黑色, 銀色選擇.\n\n\n\nSold Out", "pred_label": "__label__1", "pred_score_pos": 0.5488450527191162} {"content": "Includes a hard-copy book and access to an online Learning Locker (ebook). If you have taken the respective ProMark class within the past 3 months, you will also receive 90 days of on-call training support for that class. (Please add your class date in either of the text fields below.)\n\n\nPrice includes shipping and handling.\n\nIn-person, instructor-led class open to the public at TriHealth's Norwood location. Electronic training material will be provided. You may purchase a hardcopy training manual to take home ($25) by selecting the option listed. Marking in or damaging classroom-use training material will result in a charge. Class will be cancelled 2 business in advance if a minimum # of students is not reached.\n\n\n\n\nCourse Length: 1 day, 8:30 AM to 4:30 PM\n\n\nTarget Student: This course is designed for individuals who already have foundational knowledge and skills in Excel 2016 and who wish to begin taking advantage of some of the higher-level functionality in Excel to analyze and present data.\n\n\nCourse Description\n\n\nYou will:\n\n* Work with functions\n\n* Work with lists\n\n* Analyze data\n\n* Organize and analyze datasets and tables.\n\n* Visualize data with charts.\n\n* Use PivotTables and PivotCharts\n\n\nCourse Content\n\nLesson 1: Working with Functions\n\nTopic A: Work with Ranges\n\nTopic B: Use Specialized Functions\n\nTopic C: Work with Logical Functions\n\nTopic D: Work with Date & Time Functions\n\nTopic E: Work with text Functions\n\n\nLesson 2: Working with Lists\n\nTopic A: Sort Data\n\nTopic B: Filter Data\n\nTopic C: Query Data with Database Functions\n\nTopic D: Outline and Subtotal Data\n\n\nLesson 3: Analyzing Data\n\nTopic A: Create and Modify Tables\n\nTopic B: Apply Intermediate Conditional Formatting\n\nTopic C: Apply Advanced Conditional Formatting\n\n\nLesson 4: Visualizing Data with Charts\n\nTopic A: Create Charts\n\nTopic B: Modify and Format Charts\n\nTopic C: Use Advanced Chart Features\n\n\nLesson 5: Using PivotTables, and PivotCharts\n\nTopic A: Create a PivotTable\n\nTopic B: Analyze PivotTable Data\n\nTopic C: Present Data with PivotCharts\n\nTopic D: Filter Data by Using Timelines and Slicers\n\n\n\nExcel 2016 Level 2 (course material only)", "pred_label": "__label__1", "pred_score_pos": 0.9973228573799133} {"content": "How $98 trillion of household wealth in America is distributed\n\n\nThe gap between rich and poor in America is the worst it’s been in more than a half century. It’s a concern cited by every leading Democratic presidential candidate in the 2020 election, but many may not realize what it actually means.\n\n\n- Advertisement -\n\nThe upper middle class and the middle class would share one piece, or about 10%, and the lower middle class would get .3% of the pie. The poorest Americans, people in the bottom 20%, wouldn’t get any. On average, they are more than $6,000 dollars in debt.\n\nCBS News\n\nPeople presented with this image of the country’s wealth distribution were surprised.\n\nBeberlee Maldonado said it wasn’t what she expected and called it “disturbing.”\n\n“It’s very sad. It’s very depressing,” Jessica Ortiz told “CBS This Morning” co-host Tony Dokoupil, adding that she grew up in the poorest category.\n\nIn the 2020 election cycle, Democratic candidates Senators Elizabeth Warren and Bernie Sanders have promised to redistribute the pie with a special tax on fortunes $50 million and up.\n\n“The wealthiest people in this country will start paying their fair share of taxes,” Sanders said on the campaign trail in May.  \n\nIncome inequality: $0.01 for average American family is $11,700 for Jeff Bezos\n\nPolls show most Americans support the idea. Asked if she thinks there should be an extra tax on the super wealthy, Maldonado, “Why not? They could afford it.”\n\n“They should,” said another woman, Adriane Huff. “Will it happen? Probably not.”\n\nNot everyone is on board with the tax.\n\n“That’s against sorta the American way,” said John Sheffield at the New York Boat Show. “It would be a total disaster … And I’d actually like for them to continue to promote it because they won’t get elected in that way.”\n\nSheffield and Mark Tedford run an investment firm in Connecticut.\n\n“Wealth redistribution is always popular amongst the masses who don’t have the wealth and not popular amongst the 1% that do,” Tedford said. “But it doesn’t make economic sense to me.”\n\nAsked to explain why, Tedford said, “I guess the alternative is, do we need a socialist economy where everyone has the same? That doesn’t make sense either. A lot of people who have a lot have earned it and made it.\n\n“They’ve started their own companies, they’ve grown businesses, they’ve worked hard, they’ve gotten good degrees, they’ve gone to school. They may have had more opportunity than others, but there’s a lot of people who just haven’t done that.”", "pred_label": "__label__1", "pred_score_pos": 0.9734320640563965} {"content": "How do actors get paid? – Digital Art Techniques Pdf\n\n • by\n\nWhen a character dies, the show’s producers pay the actors, usually in the form of an actor’s fee, a percentage of their gross pay, and a percentage of their work for the day. But sometimes a character is killed off during the course of the day (for example, if the actor’s character leaves the set early). These actors are paid what the script called ‘post-mortem compensation’ – a percentage of the actor’s post-mortem compensation plus their base pay.\n\nHow do you keep paying actors?\n\nSometimes a death happens while the writer/director is editing – there might be a scene or a set-up that’s a bit too complicated for the writer to get things down correctly, or maybe the writer is a bit late to the event. In these circumstances, the writers or cast will take advantage of the post-mortem compensation. The writer/director will then receive a percentage of the post-mortem compensation until the post-mortem pay and post-mortem compensation is paid out in full.\n\nWhat is the Post-Mortem Compensation Scheme?\n\nThe Post-Mortem Compensation Scheme is similar to the producer’s post-mortem compensation. However, the post-mortem compensation is based on the amount of work per-day that the character was working on on the day of the death. For example, if a character was working at a bar for 8 hours, then the post-mortem compensation would be based on their ‘work-per-day average’. Alternatively, the post mortem compensation is based on the character’s ‘pre-mortem compensation’ – the final paycheck for post-mortem compensation, which is calculated by using the gross amount of work the character did on the day.\n\nExample: John Fenton, a young actor hired for the part of a policeman, is playing the part for 6 hours and 24 minutes. John Fenton earns $500 per day, but at the end of the day he has earned $650 ($600 ÷ 6) = $800. John Fenton’s pre-death ‘work-per-day average’ for the day is: $250/8 Hours\n\n(6 x $500/day = $750)\n\nJohn Fenton’s post-death post-mortem paycheck for the day is calculated by dividing the original $650 by his pre-mortem compensation. If John Fenton was still working, he would have earned $600 ($600 ÷ 6) = $950, because\n\nmodern techniques in neuroscience research building, common techniques that hackers username, how to setup your sony camera for filmmaking, filmmaking tutorials for beginners, digital stamp images for card making", "pred_label": "__label__1", "pred_score_pos": 0.5699623823165894} {"content": "\n\n\nCommon problems\n\nPart of the automatic glass cutting machine\n\n\nGeneral by fully automatic glass cutting machine cutting table, cutting bridge and computer control box three some. Was sent by bracket, desktop, cutting table, belt and transmission equipment, air cushion, etc. Bracket is used to support the desktop, it consists of steel column, steel beam etc. Desktop made from laminated plates, there are 3-6 ship longitudinal arrangement, in which the belt transport outside of the desktop are paved with felt.\n\nDesktop has many holes, holes are connected to the air cushion bellows, carrying on appearance usually slightly below the blanket surface. Delivery of glass, after lifting equipment to raise its, their appearance is slightly higher than the surface of carpets, transport belt transmission equipment and lifting devices are installed in the bottom desktop, air cushion devices composed of bellows, duct, fan, etc.\n\nCut glass, a fan, open duct damper, using a fan blowing into the bellows, bellows inside the air hole overflow from the surface of the table and the formation of air cushion, glass lifts, in order to adjust the position of the glass and avoid scratching the glass appearance, closed duct damper when cutting glass, glass on the table.\n\nAutomatic glass cutting bridge cutting machine, cutting bridge is a bridge spans the metal structure cutting table is empty, it supports on the cutting table of longitudinal lateral metal rail. Next to the guide rail of the equipment are cutting start and cutting knife wheel, glass cutter wheel of raw material is tungsten carbide, it is installed on an axis, the shaft installed in the cylinder piston rod end, shaft and cylinder are equipment for cutting the beginning.\n\nComputer control box, computer control box is converged on equipment, the operation of the automatic control cabinet. Operation, only need through the keyboard to the number of cut glass, standard, such as the shape data input computer, cutting machine cutting operation in accordance with the completion of computer instruction.\n\nGo Back", "pred_label": "__label__1", "pred_score_pos": 0.8194900751113892} {"content": "tag:blogger.com,1999:blog-393438931137369662.post2405292283965974472..comments2019-05-02T08:47:23.883-04:00Comments on Defending Pandora: Remote EmoteKEHutchinsonhttp://www.blogger.com/profile/17664981385715429246noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-393438931137369662.post-79946381662906871582007-10-12T17:13:00.000-04:002007-10-12T17:13:00.000-04:00good post, and good question too.I do both. If I d...good post, and good question too.

I do both. If I don't know the person I like to talk to them soon after an initial email. Better yet meet them, but you'll often never meet a client.

True, I use email as a paper trail, but telephone is better than email for getting right to details. Furthermore, don't bother looking for deeper meaning in emails - it's often not there, which is why I'll sometimes write a long detailed email then realize I should probably call about the issue. Especially if it's a problem, the email should get tossed out in case THEY are looking for an underlying message.----t h rive----https://www.blogger.com/profile/08804253308939846661noreply@blogger.comtag:blogger.com,1999:blog-393438931137369662.post-19985030493190070582007-10-12T14:19:00.000-04:002007-10-12T14:19:00.000-04:00I think email and other written forms of communica...I think email and other written forms of communication can be very effective and also rely on them heavily in my work. I think that the most common challenge is for me to read the words and try to not assume that there's a particular tone or attitude behind them. It can get tricky when providing constructive criticism, for example.Sarah Barahhttps://www.blogger.com/profile/00890823931567992637noreply@blogger.com", "pred_label": "__label__1", "pred_score_pos": 0.8491090536117554} {"content": "Quick Answer: What Is Minimum Connecting Time?\n\nHow do you find the minimum connection time?\n\nThe most straightforward way to check the Minimum Connecting Time of flight connections is to retrieve it from an Availability/Schedule or PNR display.\n\nThese displays can be neutral or biased..\n\nIs 45 minutes enough for a connecting flight?\n\nAs a rule of thumb, on domestic routes, you need a minimum of 45 minutes between flights. That’s because you don’t have to go through security, customs, and immigration.\n\nIs 40 minutes enough time for a layover in Atlanta?\n\nGenerally, 50 minutes in ATL is plenty for a domestic/domestic connection. I’d leave a little more margin for error (~70 minutes) if you’re arriving in ATL between about 4-8 PM on a weekday though. Once you’re in the terminal, you can be gate-to-gate in 10-15 minutes.\n\nWhat should I do if I missed my flight?\n\n\nWhat is a minimum connection time?\n\nA Minimum Connection Time (MCT) is defined as the shortest time interval required in order to transfer a passenger and their luggage from one flight to a connecting flight.\n\nIs 1 hour connection time enough?\n\nThe recommended layover time for domestic flights is normally one hour. However, as previously stated, you may require longer if your flights are booked with two different airlines, if you are traveling to a very busy airport or if you require special assistance.\n\nWhat happens if you miss your connecting flight?\n\nIf the missed connection is the airline’s fault (a delayed initial flight due to mechanical problems, for example), the airline should rebook you on the next available flight. If the next outbound flight is the following morning, the airline should either book you on another airline or provide accommodations and meals.\n\nWhat happens if you miss your connecting flight American Airlines?\n\nIf your flight is canceled or a delay causes you to miss your connection, we’ll rebook you on the next flight with available seats. We will reroute your bags automatically when you check in for your new flights. There are 3 ways to view your new trip or to choose a different flight: … View or change your trip on aa.com.\n\nIs 45 minutes enough time for a connecting flight in Atlanta?\n\n“If they say 45 minutes, 45 minutes is not an issue, because we have the intelligence,” says Steve Mayars, director of customer experience at Hartsfield-Jackson. Mayers says that Delta has the data to see how many people have missed connecting flights and have calculated departure times accordingly.\n\nCan you make a 35 minute layover?\n\nA 35-minute layover may sound like you have time to use the bathroom and grab a quick bite, but it’s probably barely enough time to make it to your next plane. Most people will tell you to give yourself at least an hour layover time for domestic flights, and two hours for international flights.\n\nWill airlines wait for connecting passengers?\n\n2. Re: Will airlines wait for transferring passengers? Not usually because it cause passengers on that plane to miss their connections, as well as making the flight late. If you’ve booked both flights on the one ticket then the airline will put on the next flight with available seats.\n\nDo you have to clear immigration on a connecting flight?\n\nMost (but again, not all) airports connect international terminals airside. When you’re connecting from an international flight to a domestic one, you’ll always have to exit and reenter security as you’ll need to go through customs and immigration (unless you have gone through preclearance aboard, which is rare).\n\nHow much time should I allow between connecting flights?\n\nConsider allowing at least 60 to 90 minutes for a U.S. domestic connection, and at least two hours for an international connection. Airlines usually allow you four hours or more maximum connecting time.\n\nIs 45 minutes enough time for a connecting flight in Doha?\n\n1 hour to 45 minutes is very common as transit time. No problem. Anything less than 30 minutes is tight. So you are fine.\n\nCan I get compensation for missed connection?\n\nCompensation for missed connecting flights. If passengers arrive at their destination over three hours late due to a missed connecting flight, you have the right to compensation as well as some additional benefits at the airport.", "pred_label": "__label__1", "pred_score_pos": 0.5858827829360962} {"content": "Simulations of Strain on Nanomaterials\n\nPrinciple Investigator: Dr. Charles Cornwell\nHPC System: Spirit, Garnet\n\n\nVisualization Details:\n\nThe visualization of this project begins with analyzing the LAMMPS simulation results. The dump files contains a list of all of the atoms in the simulation. The first thing that is extracted from the data is the 3D position and the energy value of each atom. To represent each atom on a rendered image, a sphere was generated in VTK using the 3D position as the center point of the sphere.\n\nTo create the appearace of a mesh, the atoms needed to be connected by tubes. Atoms that are within a certain distance of each other are connected. This is accomplished by a version of the k-nearest neightbor algorithm. The atoms are sorted into buckets which prevent a polynomial runtime complexity. Next, the straight line distance for each atom in the bucket is calculated. The distances within the desired range are converted into a tube that connects those two spheres inside VTK.\n\nColors are applied to the spheres and tubes based on the energy values collected from the dump files and saved into a PLY format. The PLY files were rendered using 3D Studio Max.", "pred_label": "__label__1", "pred_score_pos": 0.9999293088912964} {"content": "Question: Which Country Has Most Satellites In Space?\n\nWhich country reached space first?\n\nthe Soviet Union’sYuri Gagarin was the first person to fly in space.\n\n\nFollowing the flight, Gagarin became a cultural hero in the Soviet Union..\n\nDoes Australia own any satellites?\n\nIn 1967, Australia became the third nation to design and launch a satellite to orbit the earth. … It was launched at Woomera on 29 November 1967, making Australia only the third country in the world to build and launch its own satellite, behind Russia and the United States.\n\nIs NASA better than ISRO?\n\nNASA is a space administration agency whereas ISRO is a research agency. … NASA is mostly based on research-oriented missions whereas ISRO is mostly based on development-oriented like communication, weather forecasting satellites etc. NASA’s technologies are highly advanced when compared to the technology used by ISRO.\n\nWhat is the rank of ISRO in world?\n\n5th inRanked 5th in the World. With a budget of more than 1.5 billion dollars and record of launching the most satellites in a single mission, India’s leading space agency, the ISRO ranks at no. 5 in the world. Only space agencies of USA, China, Europe and Russia rank better in the list.\n\nWhich country is the best in space technology?\n\nThe USThe US is currently leading the chart of the top 10 countries in space technology, accounting for over 30% of the operational spacecraft currently in orbit around Earth.\n\nHow many satellites are in space?\n\nHave you ever wondered how many satellites orbit the Earth? According to the Union of Concerned Scientists (UCS), which maintains a database of active satellites in orbit, as of April 1, 2020, there were a total of 2,666 satellites in Space, of which 1,918 were in low Earth orbit (LEO).\n\nHow many countries have their own satellites in space?\n\nThis is a timeline of first orbital launches by country. While a number of countries have built satellites, as of 2019, eleven countries have had the capability to send objects into orbit using their own launch vehicles.\n\nWhat is China doing in space?\n\nA Chinese reusable experimental spacecraft has safely landed after two days in orbit, according to state media, and may have deployed a satellite during its mysterious, brief journey in space.\n\nHas Pakistan reached moon?\n\nNamira Salim, the first Pakistani set to travel to space, has congratulated the Indian Space and Research Organisation (ISRO) on the Chandrayaan-2 mission and its historic attempt to make a landing on the Moon. … Namira Salim is also first Pakistani to have ever traveled to the North and South poles of our planet.\n\nWhich countries have satellites in space?\n\nIn terms of countries with the most satellites the USA significantly leads the way with 859 satellites, China is second with 250, and Russia third with 146. These are then followed by Japan (72), India (55) and the UK (52). A few large space stations have been launched in parts and assembled in orbit.\n\nWhich country reached Mars first?\n\n\nDoes Pakistan have a satellite?\n\nThe Pakistan Remote Sensing Satellite (PRSS), commercially known as Remote Sensing Satellite System (RSSS), is a dual-purpose Earth observational and optical satellite. Pakistan Remote Sensing Satellite-1 (PRSS-1) was launched from China’s Jiuquan Satellite Centre on 9 July 2018.", "pred_label": "__label__1", "pred_score_pos": 0.9999145269393921} {"content": "본문 내용으로 건더뛰기\n\n모바일 대메뉴명\n\nKDI 경제정보센터\n\nKDI 경제정보센터의 다양한\n경제정책정보를 만나 보세요.\n\n\nAid for health, economic growth, and the emigration of medical workers\nIFW 2021.01.08 원문보기\nDebates on the extent to which developing countries suffer from a brain drain often focus on the emigration of locally scarce health personnel. In this paper, we empirically examine how two potential determinants -aid for health and local income levels -affect the emigration rates of doctors and nurses from developing countries. Employing a standard gravity model of international migration, we show that aid for health has a negative effect on the emigration of both nurses and doctors. The quantitative impact is moderate but non-negligible: doubling the amount of foreign assistance received by developing countries in the health sector lowers the emigration rates of health personnel by around 10%. Our findings suggest that donors influence the emigration decisions of doctors and nurses through improvements in health infrastructure and health care services. Higher income per capita is also associated with lower emigration from developing countries for doctors and nurses alike. Given that nurses typically belong to the poorer segments of populations in the countries of origin, we can conclude that even at low initial income levels, on balance, economic growth provides an incentive to stay rather than enabling would-be migrants to finance migration costs and encouraging them to leave.\nKDI 경제정보센터", "pred_label": "__label__1", "pred_score_pos": 0.932228684425354} {"content": "UK in 12-year wage dive\n\nUK employees will have to wait another nine years to get back to the level of income they enjoyed in 2009, during which time they will have lost an average of £8,500 in real-term wage losses, according to research by the Trades Union Congress (TUC).\n\nThe research, which tracked wage and inflation data between 2009 and 2012, as well as forecasts from the Office for Budget Responsibility (OBR), found that workers are just a quarter of the way through the UK’s 12-year wage dive.\n\n\nBrendan Barber, general secretary at TUC, said: “The dire state of the economy has pushed down wages. Workers today are on average nearly £1,600 poorer than they were three years ago.\n\n“Even when wages start to pick up again, it will take years to undo the damage wreaked by austerity and high inflation. Unless things change, the UK’s 12-year wage dive will continue until 2021 and cost the average worker around £8,500.”", "pred_label": "__label__1", "pred_score_pos": 0.9544969201087952} {"content": "\n\n\n\n\nEnergy Central Power Perspectives: GIS System Integration for Multiple Utility Business Processes: Exclusive Interview with Kjetil Nymoen of Hafslund Nett\n\nimage credit: Kjetil Nymoen\n\nToday’s utilities find the data that comes from GIS, or geographic information systems, to be more and more critical for optimizing business functions. The application of GIS into the utility sector spans many potential applications, from enhancing reliability through ease of maintenance, identifying opportunity for increased distributed energy resources, training purposes, and much more. Given the wide applicability of GIS technology and the data it generates, making sure GIS is efficiently and holistically integrated across different businesses is critical to proper implementation.\n\nKjetil Nymoen is a Solutions Architect working on accomplishing just that at Hafslund Nett. He will also be sharing his knowledge on this exciting and emerging topic at the upcoming GIS4SmartGrid 2019 conference from SmartGrid Forums. In advance of his presentation, entitled ‘GIS System Integration – connecting a number of new and legacy systems to provide geospatial data and context to multiple utility business processes,’ Kjetil was gracious enough to share insights into his work and this upcoming presentation with Energy Central:\n\n\nMatt Chester: To start off, can you provide some information about your background and how you first got involved in the intersection of GIS and utilities? Why is this an area that attracted you and what makes it so important?\n\nKjetil Nymoen: I have been working in the utility business since 1995. I started my career at a small electric utility here in Norway, where I worked as a power engineer. I was lucky to be a part of a project there where we went from paper maps to digital information. It was the early days of digital transformation with very simple desktop applications. But I was hooked on the use of IT solutions. It opened a new world for me, and I decided to move into the IT business.\n\nIn 2000, I started to work with ArcGIS in a private IT company called Geodata. They had signed a big contract with some electric utilities, and I remember hard work for a long, long time. Data migration, functional testing, development, a lot of discussion, trying and failing. But it was fun, and I did learn the power of GIS and location. It was learning by doing.\n\nSo, now I can look back and realize that I have been working with GIS for utilities for 19 years and have been part of the huge transformation from desktop to servers to web services to the cloud. It’s been a fun journey, and the journey for me now continues at the biggest electric utility here in Norway.\n\n\nMC: Many people in the industry are talking about how the advent of new big data sources is a driver of change in utilities, but your talk is also going to touch upon how that data is more accessible than ever, on any device and anywhere. How does this ease of access to data affect what’s possible in the utility space? Does it also present some new challenges to overcome?\n\nKN: Easy access to data is fundamental for decision-making and to get people to interact in a much better way. Earlier people in the office had to go through several systems to get the information they needed. Today, they just open one web application and they get what they need. The field crews now have all the data they need on the smartphone, and a lot of that data is updated in real-time. I do have a statement from one of the field crews, so you should join the conference to hear what he has to say!\n\nJust the fact that people now can get access to data on any device and anywhere is a huge step for our business. Faster and more accurate decisions, saving money, and more happy customers. There are some challenges you must be aware of. IT security is one of them, and also remembering the people. New tools and apps do not always solve everything, but as long as you involve and talk to people and support them, you will get positive and creative feedback.\n\nData quality is also something to pay attention to. The users must trust the data, so we do have a huge focus on data quality.\n\n\nMC: Another key point you’re going to talk about at the GIS4SmartGrid 2019 conference is the importance of location. Can you give a preview of what you mean by that and how utility leaders can and should embrace that idea?\n\nKN: Everything happens somewhere, right?\n\nBy using the location, you can derive new information products and see patterns you did not even know where there. That is the actual power of GIS analytics. All of us need to be much better in using those capabilities from GIS. By running more analytics on our data and overlying that with other data, we will gain new insights. Insights that we can use to better plan and design, improve maintenance, improve outage handling, improve customer service. But you need the location to be able to do that.\n\nI will show some examples in my presentation about what we are doing and what kind of questions we are now able to answer. We are not perfect, but we have started and will continue to explore the capabilities of GIS.\n\n\nMC: If the goal is to be able to use data to predict what’s going to happen in the coming days, months, and years, what’s going to be the impact of utilities that are not fully embracing these data analytics and GIS integrations today?\n\nKN: It’s not easy to answer that question, but I can share a few thoughts.\n\nThere will be more use of sensors that measure temperature, movement, light, water, humidity, proximity, etc. These are cheap sensors that you can place anywhere, and they are already available on the market. The data from these sensors is stored in big data shares and fed into machine learning routines that tell us when we need to perform maintenance or it’s time to replace an asset, or even prevent a failure.\n\nWhen an outage occurs, the analytics are done automatically based on historical outage data, SCADA data, sensor data, weather data, lightning data, etc. The real-time data combined with historical data makes it possible for us to be very close to the self-healing grid. The data from the AMI meters help us to have a complete overview of the entire network, including the low voltage network. Fault location detection occurs by itself, and complete control of earth faults. Of course, the use of drones during a big outage situation with real-time image data processing and machine learning routines is also important. To be able to do all of this, you first need to run a lot of analytics on your data to be able to create learning models for machine learning. Understanding your data and the patterns is going to be crucial, so I think the utilities really need to hire data scientists as well.\n\nI strongly believe that utilities need to embrace the data analytics and the possibilities with new technology. The technology and methods are available today, so we should turn data into advanced decision-making.\n\n\nMC: As with many IT solutions that are emerging across various industries today, you stress the importance of open-standard interfaces for these utility solutions. Can you talk about why that’s so important?\n\nKN: Data is important and cannot be locked into a single system with a complex data model. We need systems with open-standard interfaces so we can decide how and where to make use of these data. If the data are easily available to us, we can then, for example, develop our own function and make that data and functionality available for many people. That is often a much better approach than having the vendor develop a new tool in their system.\n\nWith standard interfaces, you can set up an integration very fast without a project that will take you thousands of hours and a lot of money.\n\nWe have very good experiences with new vendors that create new solutions with open-standard interfaces. It is a new world, and really it is the way it should be.\n\nMy talk at the conference will be about how we use our data-driven architecture to give people easy access to data from multiple systems. I will focus on our IT architecture where we have a new data-driven platform managed by a ‘DataHub’ running in the cloud. So, I encourage you to join the conference and then you will understand the importance of standard interfaces.\n\n\nMC: To finish, you’ll be at the GIS4SmartGrid 2019 conference not only as a presenter but also as an attendee. What are you excited to learn more about while surrounded by utility experts in GIS?\n\nKN: First of all, attending a conference like this is about listening and learning from others, and also to meet people and create new contacts. You will always get new ideas and get inspired to go home and implement them. The hard work begins when you are back home, and you start to sell that idea internally. I am really looking forward to this conference.\n\n\nIf you're interested in learning more about how utilities can integrate GIS across varying business processes, be sure to check out Kjetil Nymoen's presentation this topic at the GIS4SmartGrid conference this upcoming September in Berlin, Germany. You can learn more about the agenda and register for the conference here.\n\n\n\nNo discussions yet. Start a discussion below.\n\nGet Published - Build a Following\n\n\n\n                 Learn more about posting on Energy Central »", "pred_label": "__label__1", "pred_score_pos": 0.7137466669082642} {"content": "About Shawn Mendes\n\nShawn Peter Raul Mendes (; born August 8, 1998) is a Canadian singer and songwriter. He gained a following in 2013, posting song covers on the video-sharing application Vine. The following year, he caught the attention of artist manager Andrew Gertler and Island Records A&R Ziggy Chareton, which led to him signing a deal with the record label. Mendes's self-titled debut EP was released in 2014, followed by his debut studio album Handwritten in 2015. Handwritten debuted atop the US Billboard 200, making Mendes one of five artists ever to debut at number one before the age of 18. The single \"Stitches\" reached number one in the UK and the top 10 in the US and Canada.\n\nHis second studio album Illuminate (2016) also debuted at number one in the US, with its singles \"Treat You Better\" and \"There's Nothing Holdin' Me Back\" reaching the top 10 in several countries. His self-titled third studio album …Read more on Wikipedia", "pred_label": "__label__1", "pred_score_pos": 0.9998701214790344} {"content": "If you’re looking for support, after-hours services or trustworthy information, we recommend the following organisations, services and resources:\n\nThird-party Links\n\nSome links within this website may lead to other websites, including those operated and maintained by third parties. Healthy Thinking Psychology (HTP) is not responsible for examining or evaluating the content or accuracy of these third-parties’ websites nor does it offer any warranties in relation thereof. You agree that HTP will not have any liability or responsibility for any third-party materials or websites, or for any other materials, products, or services of third-parties. Michelle McQuaid and its directors, employees, agents or affiliates are not liable for any harm or damages related to the purchase or use of goods, services, resources, content, or any other transactions made in connection with any third-party websites. Please review carefully the third-party’s policies and practices and make sure you understand them before you engage in any transaction. Complaints, claims, concerns, or questions regarding third-party products should be directed to the third-party.\n\nHTP includes these links solely as a convenience to you, and the presence of such a link does not imply any responsibility for the linked site or an endorsement of the linked site, its operator, or its contents.\n\nEvidence-based psychological care delivered by a dedicated, nurturing and empathic team.", "pred_label": "__label__1", "pred_score_pos": 0.9996784329414368} {"content": "Use your brain for what it's good at\n\nMoça com livro by Almeida Júnior\n\nHumans are good at thinking; computers are good at computing.\n\nComputing is not an analog for thinking. Computing is the process of calculation to determine the solution to a problem. It employs specific mathematical processes. To think, in contrast, is to wonder, to ponder, and to conceive. It is a more general phenomenon than computing that requires a human-like consciousness. Humans can use thinking for mechanical and repetitive tasks in computing, mathematics and other domains, but we gravitate toward the kind of thinking that is characterized by making non-linear connections, pattern recognition, and creative insight.", "pred_label": "__label__1", "pred_score_pos": 0.9439802169799805} {"content": "Phytoplankton factory in the Argentine Sea\n\nPhytoplankton Factory in the Argentine Sea\nJanuary 5, 2021. Credit: NASA Earth Observatory\n\nThe Goldilocks zone typically refers to the habitable area around a star where conditions are right for the existence of liquid water and possibly life. But on Earth, the South Atlantic Ocean has its own kind of Goldilocks zone. In spring and summer, conditions in the Argentine Sea off Patagonia often become just right for phytoplankton, and populations of the plant-like organisms explode into enormous blooms.\n\nIn late 2020, started to show the colorful signature of off the coast of Argentina and around the Falkland Islands (Islas Malvinas). Vivid greens and blues still swirled in the sea on January 5, 2021, when the Moderate Resolution Imaging Spectroradiometer (MODIS) on NASA's Terra satellite acquired this natural-color image (above).\n\nThe Operational Land Imager (OLI) on Landsat 8 acquired the image below on January 2, 2021. It shows a detailed view of phytoplankton in Grande Bay, off of Argentina's Santa Cruz province. Part of the Santa Cruz River is visible at the top-left.\n\nRivers like the Santa Cruz carry nutrients from the land and deliver them to the ocean, promoting phytoplankton growth. (Suspended sediment could be contributing some of the color visible in these images.) Another source of nutrients is dust from Patagonia, which strong westerly winds can carry offshore and drop on the ocean surface.\n\nBut phytoplankton blooms are also stimulated by the ocean's complex circulation patterns and abundant fronts—where separate water masses (with distinct temperatures, saltiness, and nutrients) meet. At the Brazil-Malvinas Confluence, for example, warm, saltier tropical waters flow south and meet the cooler, fresher waters flowing north from the Southern Ocean. Along a front, the rising of a less-dense mass can carry nutrients up to the surface, where phytoplankton also have ample sunlight to fuel their growth.\n\nPhytoplankton Factory in the Argentine Sea\nJanuary 2, 2021. Credit: NASA Earth Observatory\n\nWithout a physical sample, it's not possible to say for sure which type of phytoplankton are present in these images. Scientists found dinoflagellates (Prorocentrum minimum) while collecting samples during an intense bloom in spring 2005; diatoms (Chaetocceros debilis) dominated a bloom in early summer 2003. Both groups tend to appear various shades of green in satellite images. In December 2008, scientists also found a dense of coccolithophores (Emiliania huxleyi), which tend to turn the ocean a chalky green-blue.\n\nNotice the color gradients across the images. Bright green areas could be a mix of dinoflagellates, diatoms, and coccolithophores; in the bluer areas, coccolithophores likely dominate. Coccolithophores can continue to grow in waters where iron has been depleted, whereas diatoms need both silicate and iron.\n\nWhichever species were blooming, their abundance indicates the biological richness along Patagonia's continental shelf, which is the site of some of the world's richest fisheries.\n\nExplore further\n\nImage: Spring color in the North Sea\n\nMore information: Gastón O. Almandoz et al. The genus Pseudo-nitzschia (Bacillariophyceae) in continental shelf waters of Argentina (Southwestern Atlantic Ocean, 38–55°S), Harmful Algae (2006). DOI: 10.1016/j.hal.2006.07.003\n\nWilliam M. Balch et al. Coccolithophore distributions of the North and South Atlantic Ocean, Deep Sea Research Part I: Oceanographic Research Papers (2019). DOI: 10.1016/j.dsr.2019.06.012\n\nW. M. Balch et al. Surface biological, chemical, and optical properties of the Patagonian Shelf coccolithophore bloom, the brightest waters of the Great Calcite Belt, Limnology and Oceanography (2014). DOI: 10.4319/lo.2014.59.5.1715\n\nJosé I. Carreto et al. Mycosporine-like amino acids and xanthophyll-cycle pigments favour a massive spring bloom development of the dinoflagellate Prorocentrum minimum in Grande Bay (Argentina), an ozone hole affected area, Journal of Marine Systems (2017). DOI: 10.1016/j.jmarsys.2017.10.004\n\nVivian A. Lutz et al. Primary production in the Argentine Sea during spring estimated by field and satellite models, Journal of Plankton Research (2009). DOI: 10.1093/plankt/fbp117\n\nAlberto R. Piola et al. Physical Oceanography of the SW Atlantic Shelf: A Review, Plankton Ecology of the Southwestern Atlantic (2018). DOI: 10.1007/978-3-319-77869-3_2\n\nProvided by NASA Earth Observatory\nCitation: Phytoplankton factory in the Argentine Sea (2021, January 15) retrieved 28 February 2021 from https://phys.org/news/2021-01-phytoplankton-factory-argentine-sea.html\n\nFeedback to editors\n\nUser comments", "pred_label": "__label__1", "pred_score_pos": 0.6439354419708252} {"content": "Question: What Is The Biggest Negative Number?\n\nWhat’s the closest number to zero?\n\n1If you mean integer then 1 (or -1) is the closest integer to zero..\n\nIs zero less than or equal to zero?\n\n4 Answers. No zero is not less then zero, i <= 0 becomes 1 because zero is less than or equal to zero. The <= (\"less than or equal\") operator returns true if the left hand side is less than or equal to the right hand side.\n\nIs 0 an even or odd number?\n\nThe use of the phrase “even number, or the number zero” implies that zero is not even. On the other hand, the mayor is lumping zero together with the even numbers, so he certainly doesn’t think it’s odd. So what is it – odd, even or neither? For mathematicians the answer is easy: zero is an even number.\n\nHow do you know which negative number is greater?\n\nOn the number line the negative numbers are to the left of zero. –5 is less than 4, because –5 lies to the left of 4 on the number line. –1 is greater than –3, because –1 lies to the right of –3 on the number line.\n\nIs negative number bigger than 0?\n\n\nWhat is Coprime number?\n\nIn number theory, two integers a and b are relatively prime, mutually prime, or coprime if the only positive integer that evenly divides (is a divisor of) both of them is 1. One says also a is prime to b or a is coprime with b.\n\nIs there a negative zero?\n\nAn integer is a whole number that can be either greater than 0, called positive, or less than 0, called negative. Zero is neither positive nor negative. … Zero is called the origin, and it’s neither negative nor positive. For every positive integer, there’s a negative integer an equal distance from the origin.\n\nIs 0.5 and 0.05 the same?\n\n0.5 is greater then 0.05. As, 0.5=5/10 but 0.05=5/100.\n\nWhat is the opposite of 0?\n\nnegativeThe opposite of a positive number is negative, and the opposite of a negative number is positive. Since the opposite of 0 is 0 (which is neither positive nor negative), then 0 = 0. The number 0 is the only number that is its own opposite. Whole numbers and the opposites of those numbers are all integers.\n\nWhat is the lowest number ever?\n\nIf we only have three digits to spare, the smallest possible number is 0.01. With four digits, it’s 0.001. You’ll notice a pattern here: the significand is always the same, only the exponent changes. What we need is a significand of 1 , because that’s the smallest one after 0 .\n\nWhat is bigger positive or negative?\n\nPositive numbers are bigger, greater, or higher than zero. They are on the opposite side of zero from the negative numbers. … Negative numbers get smaller and smaller the farther they are from zero. This can get confusing because you may think that –400 is bigger than –12.\n\nWhat is the largest even negative number?\n\nThe least prime number is 2, and the greatest negative even integer is −2, so the answer is 0.\n\nCan natural numbers be negative?\n\n): The counting numbers {1, 2, 3, …} are commonly called natural numbers; however, other definitions include 0, so that the non-negative integers {0, 1, 2, 3, …} are also called natural numbers. Natural numbers including 0 are also called whole numbers. … They can be positive, negative, or zero.\n\nWhy is 11 not a prime number?\n\nFor 11, the answer is: yes, 11 is a prime number because it has only two distinct divisors: 1 and itself (11). As a consequence, 11 is only a multiple of 1 and 11.\n\nIs 2 not a prime number?\n\nThe first five prime numbers: 2, 3, 5, 7 and 11. A prime number is an integer, or whole number, that has only two factors — 1 and itself. Put another way, a prime number can be divided evenly only by 1 and by itself. Prime numbers also must be greater than 1.\n\nIs a negative number smaller than zero?\n\n\nHow do you read a negative number?\n\n\nIs Infinity odd or even?\n\nThere are no numbers bigger than infinity, but that does not mean that infinity is the biggest number, because it’s not a number at all. For the same reason, infinity is neither even nor odd. The symbol for infinity looks like a number 8 lying on its side: .\n\nWhat is the smallest negative number?\n\nThere are an infinite number of negative integers as they approach negative infinity. So there is no smallest negative integer. the set of negative integers is {-1, -2, -3, …}. The greatest negative integer is -1.\n\nIs negative 2 an odd number?\n\nOriginally Answered: Can negative numbers be odd or even ? An integer that is not an odd number is an even number. … Since odd andeven numbers are division for only natural numbers, negative integers (-2, -1) are neither odd nor even.", "pred_label": "__label__1", "pred_score_pos": 0.9978523850440979} {"content": "Quick Answer: Who Developed The Scapegoat Theory?\n\nHow do I stop being a scapegoat?\n\n\n\nRefrain from arguing.\n\nLean on your circle of support.\n\nRemember compassion..\n\nWhat is another word for scapegoat?\n\nIn this page you can discover 10 synonyms, antonyms, idiomatic expressions, and related words for scapegoat, like: substitute, sacrifice, dupe, victim, butt, fall guy, whipping boy, goat, patsy and praise.\n\nWhat was the scapegoat in the Bible?\n\nThe scapegoat was a goat that was designated (Hebrew: לַעֲזָאזֵֽל‎) la-‘aza’zeyl; “for absolute removal” (for symbolic removal of the people’s sins with the literal removal of the goat), and outcast in the desert as part of the ceremonies of the Day of Atonement, that began during the Exodus with the original …\n\nWhat does Azazel mean in Hebrew?\n\nscapegoatAccording to The Expositor’s Bible Commentary, Azazel is the Hebrew word for scapegoat. This is the only place that the Hebrew word is found in the whole Hebrew Old Testament.\n\nWhat is a scapegoat child?\n\nScapegoating always includes verbal abuse, including generalizing about a child’s character or personality. Needless to say, in the absence of other voices imparting positive messages about who she is, the daughter internalizes what’s said to her as essential “truths” about herself.\n\nWhat scapegoat means?\n\nnoun. a person or group made to bear the blame for others or to suffer in their place. Chiefly Biblical. a goat let loose in the wilderness on Yom Kippur after the high priest symbolically laid the sins of the people on its head.\n\nWhat is the opposite of scapegoat?\n\nWhat is the opposite of scapegoat?antagonizeragitatortormenterbullyintimidatorannoyerdaunterpestererpersecutortease2 more rows\n\nHow is the scapegoat chosen?\n\nThe scapegoat feels the acute injustice of his/her role. … But family scapegoats also have both innate and learned power. They are not chosen at random. Rather, they are typically targeted because of their strengths.\n\nIs Jesus a scapegoat?\n\n‘ (15.13-14), thus allowing Jesus to be designated as the immolated goat and Barabbas as the scapegoat (15.15).\n\nHow do I stop being a scapegoat at work?\n\nIf you want to stay clear of team nastiness, work alone. Otherwise, learn the dos and don’ts to stop the deadly sport of scapegoating.Let’s zero in on scapegoating.* Don’t suffer in silence.* Do build alliances.* Don’t fall into the trap and blame others.* Do learn to be self aware.* Don’t focus on the negative.More items…•\n\nWho came up with the scapegoat theory?\n\nThe term ‘scapegoat’ actually has its origin in the Old Testament, more specifically, in Chapter 16 of the Book of Leviticus, according to which God instructed Moses and Aaron to sacrifice two goats every year.\n\nWhat is the origin of scapegoat?\n\nDid you know the word ‘scapegoat’ is a word coined in the 16th century to describe the ritual animals that the Jewish community placed their sins onto in preparation for Yom Kippur? The other goat, the one for the Lord, would be slaughtered as part of the general Yom Kippur rituals. …\n\nWhat is the scapegoat theory in psychology?\n\n\nWhat is the purpose of a scapegoat?\n\nThe scapegoat was sent into the wilderness for Azazel, possibly for the purpose of placating that evil spirit, while a separate goat was slain as an offering to God. By extension, a scapegoat has come to mean any group or individual that innocently bears the blame of others.", "pred_label": "__label__1", "pred_score_pos": 0.5795679092407227} {"content": "Project Description\n\nHow to Teach Abstract Concrete Nouns\n\nIn grade 3, kids start learning to identify concrete and abstract nouns. Students can easily get confused about whether it is a concrete or abstract noun.\n\nMoreover, it is not enough to be able to identify the type of noun. Students are expected to tell the differences between concrete and abstract nouns. As well, properly use them while building sentences.\n\nhow to teach abstract and concrete nouns\n\nAbstract Nouns\n\nAbstract nouns identify ideas, concepts, qualities, experience, and feelings. Abstract nouns are intangible.\n\nExamples of abstract nouns:\n\nAnger, awe, bravery, brilliance, calm, childhood, compassion, courage, deceit, delight, despair, faith, freedom, friendship, hate, honesty, hope, integrity, joy, justice, kindness, knowledge, liberty, love, loyalty, misery, patriotism, peace, pleasure, pride, reality, trust, truth, wisdom.\n\nConcrete Nouns\n\nObjects and things that can be experienced through the five senses (feel, touch, smell, hear, and see) are concrete nouns. The majority of nouns are concrete. Concrete nouns can be people, places, animals, vegetables, food and more.\n\nExamples of concrete nouns:\n\nPeople: actor, boy, brother, doctor, firefighter, man, mother, queen. Fruits/Vegetables/Food: butter, cake, cherry, fruits, grain, pancake, pear, popcorn. Animals: chicken, goose, horse, jellyfish, kitten, ladybug, rabbit, robin. Places: hill, house, island, mountain, river, shop, street, wood. Things: brick, cent, drum, gate, glue, mailbox, scarecrow, scarf.\n\nTeaching Tips\n\n • Tip #1. Use visuals. Put wall cards for the references in an easy and reachable place where every student can see them. Pass small cards with definitions (one for each table should be enough).\n\n • Tip #2. Practice makes perfect. Students will start with a reading. They will read the noun and decide whether it is concrete or abstract. Direct them to color the crab with the right type of noun. When they decide whether it is abstract or concrete, ask them to write the definition and justify their answer. In the beginning, they can refer to the wall cards, but going further, they should be able to write the definition easily and without any reference. Completing more worksheets and writing down the definition will give them the ability to remember the concept better.\n\n • Tip #3. Organize thoughts before writing. In this section, have your students draw this word. This activity is significant as it gives the advantage to visualize and organize their thought and prepare for the next activity.\n\n Now, students are ready to write the explanatory sentence. It will be easy to complete, as they already draw the picture, all they need to turn this picture into a beautiful sentence.\n\n • Tip#4. Use adjectives to describe the noun. While writing explanatory sentences, it is a good idea to pass the list with useful adjectives. Students can go through the list and pick one or more to write the sentence.\n\n • Tip #5. The theory is good, but practical use is also important. Now, it is time to see if your students can use this noun in sentences. Please direct them to write two sentences with this noun.\n\n • Tip #6. Brainstorm for words. To ensure that students understand concrete and abstract nouns, ask them to write three more similar nouns at the back of the worksheet.\n\n • Tip #7. Explore the five senses (extended practice for concrete nouns). For concrete nouns, direct your students to color one or more jellyfishes when they experience this object with their five senses. This activity will give them the ability to explore and communicate with the world around them.\n\n • Tip#8. Get them to focus on one task at a time. As you can see, the worksheets created in landscape orientation and should be folded in the middle. This way, students will be concentrating on one task at a time. Complete the task – turn the page and continue without confusion.", "pred_label": "__label__1", "pred_score_pos": 0.9991233348846436} {"content": "How Long Does A Bad Check Stay On Your Record?\n\nHow long does early warning Stay on record?\n\nfive yearsReported information is usually removed from your Early Warning Services file after five years, although the Fair Credit Reporting Act allows for the blemish to remain for 7 years.\n\nUntil then, you might be able to open a second chance checking account..\n\nCan a warrant be issued for a bad check?\n\n\nWhat is the penalty for a bounced check?\n\nThe jail term can be between 1-3 months – up to 3 years, or/and a fine that usually varies from AED 1,000 to AED 30,000 based on the amount of the bounced cheque. One must understand that a criminal case is purely a punishment for a criminal act, i.e., issuing a cheque without sufficient balance.\n\nWhat happens if you write a bad check that is over $500?\n\nUnder criminal penalties, you can be prosecuted and even arrested for writing a bad check. … This can be seen as a felony in many states, especially when the checks are for more than $500. It’s important to note that provision is made for accidents, because bookkeeping mistakes do happen.\n\nWill a fake check clear?\n\n\nHow do you get a bad check off your record?\n\nContact the bank that placed the negative information on your report. If the information is true, it isn’t obligated to change or remove the information. You can, however, write a short explanation of the circumstances surrounding the bad check for inclusion in your report.\n\nWhat can I do if my employer gives me a bad check?\n\nWhat to Do When Your Paycheck BouncesRemain calm. Your first reaction in this situation is likely panic, which is understandable, but a prolonged bout of anxiety isn’t going to be helpful. … Call your employer. … Call your financial institution. … Tap into Emergency funds. … Call your coworkers. … Talk to a lawyer. … Talk to your creditors. … File a complaint.More items…•\n\nCan a check bounce after it has been cashed?\n\n1 The results can be a costly lesson in the risks of accepting payment by check. The process takes time, and a check still can bounce after you deposit it—even if your bank allows you to withdraw cash from that deposit.\n\nIs there a statute of limitations on writing a bad check?\n\nIf a debt collector failed to inform you of your rights, is attempting to collect the wrong amount or is inappropriately accusing you of check fraud, you can: Check Your State’s Statute Of Limitations On Bad Checks: States typically have a two- to three-year statute of limitations (SOL) on bad checks.\n\n\nWriting a bad check is considered a wobbler crime in California, meaning it can be charged as either a misdemeanor or felony depending on circumstances of the crime. If the value of the check was under $450, the offense is generally charged as a misdemeanor. If the amount is over $450, you can be charged with a felony.\n\nCan you get in trouble for depositing a bad check?\n\nAnybody can accidentally cash a bad check, and it won’t result in a crime or any punishment, although you will incur a fee to your bank. But if you knowingly cash a bad check, you may be charged with a misdemeanor or a felony, and you could face jail time.\n\nCan you go to jail for cashing a check twice?\n\nKnowingly cashing or depositing a check twice on purpose is check fraud and can lead to federal indictments. State penalties for check fraud vary, but depending on the amount of the check in question, check fraud may come with a misdemeanor or felony charge, a fine, and/or jail time.\n\n\n\nIs it a criminal Offence to write a bad check?\n\nYou may be charged with an offence under the Criminal Code of Canada if you write a cheque when you know that there is not enough money in the account to cover the cheque. You may be prosecuted by summary conviction or by indictable conviction. … The criminal offence is the obtaining of credit by false pretense.\n\nHow do I report someone for writing a bad check?\n\nWhen businesses do receive a bad check, there are a number of reporting options they can use.Contact Your Customer. The first step to take in reporting a bad check is to contact your customer by phone or by mail. … Contact the Bank. … Notify Credit Reporting Services. … Contact the Better Business Bureau. … Contact the Police.", "pred_label": "__label__1", "pred_score_pos": 0.8379303216934204} {"content": "Which Of These Stars Has The Largest Radius?\n\nWhich star has the largest radius?\n\n\nWhich of the following layers in the sun is the coolest?\n\nWhile the center of the Sun’s core can get as hot as 30 million degrees F, its outer layers cool down. The photosphere, which is outside the core, is the coolest layer.\n\nWhy does a sunspot appear dark brown or black compared to the photosphere?\n\nAll in all, the sunspots appear dark because the are darker than the surrounding surface. They’re darker because they are cooler, and they’re cooler because of the intense magnetic fields in them.\n\nWhich of these layers of the sun is coolest a core B radiation zone C photosphere?\n\nThe inner layers are the Core, Radiative Zone and Convection Zone. The outer layers are the Photosphere, the Chromosphere, the Transition Region and the Corona. Photosphere – The photosphere is the deepest layer of the Sun that we can observe directly.\n\nREAD  Quick Answer: What Is The Oldest Market In London?\n\nWhich star has the smallest radius?\n\nThe smallest known star right now is OGLE-TR-122b, a red dwarf star that’s part of a binary stellar system. This red dwarf the smallest star to ever have its radius accurately measured; 0.12 solar radii. This works out to be 167,000 km.\n\nHow big is the biggest star compared to Earth?\n\nThe video “Star Size Comparison” (duration: 2:34) nicely visualizes how tiny Earth (diameter 12756 km) is compared to the Sun (diameter 1,392,000 km, 109.1 times Earth’s). And how tiny the Sun is compared to other stars. Factoid from the video: VY Canis Majoris (a red hypergiant) is the largest known star.\n\nWhich layer of the sun is the thickest?\n\nAt the very center is the dense, hot core. Around the core lie two layers: a thick layer called the radiative zone and a thinner, cooler layer called the convective zone. Surrounding all of them is the sun’s surface layer, known as the photosphere.\n\nWhich of the following parts of the sun is the hottest?\n\nAnd the hottest part of the Sun is its core. The surface of the Sun is a mere 5,800 Kelvin, while the center of the Sun is around 15 million Kelvin. That’s hot. Although the surface of the Sun is relatively cool, the corona can get much hotter.\n\nHow many Earths can fit in the sun?\n\n\nREAD  Which State Has Highest Population Nigeria?\n\nHow long can sunspots last?\n\nThe duration of the sunspot cycle is, on average, around eleven years. However, the length of the cycle does vary. Between 1700 and the present, the sunspot cycle (from one solar min to the next solar min) has varied in length from as short as nine years to as long as fourteen years.\n\nWhat causes sunspot?\n\nSunspots are caused by the Sun’s magnetic field welling up to the photosphere, the Sun’s visible “surface”. The powerful magnetic fields around sunspots produce active regions on the Sun, which often lead to solar flares and Coronal Mass Ejections (CMEs). Our Sun isn’t the only star with spots.\n\nAre sunspots hotter or cooler?\n\nSunspots are darker, cooler areas on the surface of the sun in a region called the photosphere. The photosphere has a temperature of 5,800 degrees Kelvin. Sunspots have temperatures of about 3,800 degrees K. They look dark only in comparison with the brighter and hotter regions of the photosphere around them.\n\nHow much hotter is the core of the sun than its surface?\n\nHow much hotter is the core of the sun than its surface? The solar core from where the Sun’s energy is made is very much hotter than the surface of the Sun. The surface of the Sun has the temperature over 5500 degrees Celsius (10,000 degrees Fahrenheit) .\n\nWhich layer of the sun do we normally see?\n\nThe photosphere is the lowest layer of the solar atmosphere. It is essentially the solar “surface” that we see when we look at the Sun in “white” (i.e. regular, or visible) light. When we observe sunspots and faculae (bright little cloud-like features) we are observing them in the photosphere.\n\nREAD  Question: What Is The Biggest Mahi Mahi Ever Caught?\n\nWhat does the corona do?\n\nA corona (Latin, ‘crown’) is an aura of plasma that surrounds the Sun and other stars. The Sun’s corona extends millions of kilometres into outer space and is most easily seen during a total solar eclipse, but it is also observable with a coronagraph.\n\nPhoto in the article by “Penmon” http://www.penmon.org/page50.htm\n\nLike this post? Please share to your friends:", "pred_label": "__label__1", "pred_score_pos": 0.8570964932441711} {"content": "Everything you need to know about education loans\n\nEverything you need to know about education loans\n\nEverything you need to know about education loans\n\nPUBLISH DATE 26th March 2018\n\nWhat we become tomorrow depends on the kind of education we receive today, this is especially true if we wish to be the fastest growing economy in the world.\n\nWhile the enrolment into higher education has only increased over the years, so has the cost of education especially in the premier institutions like IITs and IIMs from where the future of our country is expected to graduate. Faced with the increase in education fees and not willing to compromise on their dreams, parents and students are increasingly turning to education loans.\n\nIf you are new to credit and want to know all about education loans, here’s a lowdown.\n\nWhat does an education loan cover?\n\nAlmost all leading banks in the country offer an education loan. The loan amount sanctioned can cover fees and expenses that are mandatory to complete the course. Generally, a complete education loan covers all expenses including your tuition fees, hostel stay, library fees, books and courseware, and other miscellaneous expenses. Some banks also provide additional covers such as vehicle purchase for up to a certain amount, insurance protection, free credit cards, etc.\n\nTypes of courses covered\n\nEducation loans are granted for graduation, post-graduation, professional, vocational and technical courses conducted by colleges and universities affiliated or accredited to UGC, AICTE, IMC, AIBMS, etc. Professional courses like management and engineering (MBA and MS) in foreign countries are also covered by education loans. For studies abroad, you must have secured an admission before applying for the loan and see to that the institution is listed by the bank.\n\nGetting an education loan for a technical course could be easier than for a non-technical course such as photography, art, filmmaking etc. as the lenders consider the risk of defaults and job security.\n\nLoan amount\n\nThe loan amount could vary across banks, but the usual range is up to Rs 15 lakh for studies in India and Rs 20 lakh or more for studies abroad. Sanctioning the loan amount is at the discretion of the bank and also depends on the internal policies of the bank.\n\nThe banks do not ask you to pay a margin or demand a third-party guarantor for loan amount up to Rs 4 lakh. For any education loan more than Rs 7.5 lakh, lenders would look for a collateral to approve your loan, this, however, depends on the institution in which you have secured admission.\n\nThe interest rate on an education loan generally ranges between 12% to 16% and the basic lending rate starts from 9.15% onwards. The borrowers can either choose floating type of interest rate or fixed interest rate. Students can also benefit from the subsidies provided by the government of India and claim tax benefits on the interest paid. Do note it is best to check with the lenders on the latest interest rates.\n\nEligibility criteria\n\nAny Indian student, who has secured an admission in any of the approved colleges, is eligible for an education loan.\n\nAs most students embarking on courses may not have a credit history or a source of income, the banks demand a co-borrower typically parents, family members or a guardian with sufficient financial means. The co-applicant would be required to have a good credit history and collateral for a higher loan amount.\n\n\nThe tenure of the education loan usually ranges between five to 15 years and it can vary depending on the bank’s policies. Since the repayment is a huge responsibility for a first-time borrower and it depends on factors such as the type of employment that the student would get after the period of education. Hence, the lenders give an extension period after the course completion which is known as moratorium period ranging from six months to one year.\n\nParting notes\n\nFor many students, education loan would be the first exposure to the world of credit. Apart from giving the experience of borrowing and repaying a loan, education loans also provide an opportunity to build a healthy credit profile through consistent repayment and gets you to a good credit score. It also infuses a sense of credit discipline into the young minds which will be a stepping stone to secure big loans such as home loans in the future.\n\n(Punja is the chief executive and co-founder of CreditMantri.com. Views expressed here are personal.)\n\n\nClick here Details of All  : Entrance Exams 2018\n\n", "pred_label": "__label__1", "pred_score_pos": 0.7698634266853333} {"content": "Complex Systems Winter School 2015-Faculty\n\nFrom Santa Fe Institute Events Wiki\n\nComplex Systems Winter School 2015\n\n\nProgram Director\n\nSomdatta Sinha, Program Director\n\nLecturers and Faculty\n\nTanmoy Bhattacharya, Theories and Treatment of Infectious Disease\n\nLiz Bradley, Nonlinear Dynamics\n\nThis short course is a wide survey of the field of nonlinear dynamics.\n\nAnirban Chakraborti, Econophysics\n\nTitle : Econophysics I - Kinetic exchange models in complex socio-economic systems\nAbstract: In this talk, I will review pedagogically the kinetic exchange models whose outcome is the prediction of the wealth distribution in the society. Comparison with empirical data, and the analytical fitting forms for such wealth distributions will be discussed. The micro-economic formulation of such models will be also mentioned, which establishes the link between the principles of maximum entropy in physics and utility maximization in economics. Then I will also briefly review a minimal multi-agent model for the collective dynamics of opinion formation (based on the similar kinetic exchange dynamics studied in the context of wealth distribution), and its simple variants and extensions that have been proposed recently by others.\nTitle: Econophysics II - Statistical mechanics of competitive resource allocation: El Farol Bar to Kolkata Paise Restaurant\nAbstract: Demand outstrips available resources in most situations, which gives rise to competition, interaction and learning. In this talk, I will review a broad spectrum of multi-agent models of competition (El Farol Bar problem, Minority Game, Kolkata Paise Restaurant problem, and others) from the perspective of statistical physicists.\n\nArkadev Chattopadhyay , Computational Complexity\n\nHow much time or space is needed to solve a computational problem? But this should depend on what machine/platform/technology is used to solve it! Computational complexity theory provides elegant notion of efficient computation that are independent of the computer hardware technology. Further, these notions give rise to deep philosophical questions, such as the following: \"Can creativity be automated?\"\nIn these lectures, I plan to cover a few key developments in the field that should be of importance and interest to all scientific disciplines.\n\nAaron Clauset, Four Lectures on Network Science\n\nNetwork science is a thriving cross-disciplinary domain focused on the representation, analysis and modeling of complex social, biological and technological systems as networks or graphs. These four lectures will provide a compact introduction to the modern study of network science. We will examine techniques for analyzing and modeling the structure and dynamics of complex networks, and we will cover a broad selection of the core concepts in the field. Some emphasis will be placed on statistical algorithms and methods, and on model interpretation and real data. Applications will be drawn from computational biology and computational social science.\n\nSimon DeDeo, Cognitive Science and Social Minds\n\nLectures One and Two: Information Flows\n\nWhen did the French Revolution become revolutionary? How did pre-20th Century London manage violence? How did Charles Darwin synthesize Victorian science to write the Origin of the Species? Information theory not only plays a central role in physics and engineering. It can also be used to quantify critical features of the human mind and the societies it creates. In these first two lectures, I’ll introduce the core mathematics of information theory, and build intuition about what they mean. Drawing on recent collaborative research with scientists and scholars in the humanities—I’ll present the three case studies described above. I’ll show how information theory in the big data era allows us to get a new picture of the development of human society and, often, a glimpse of the minds—elite and non-elite—of the past and the future. And I’ll show how fundamental mathematical laws of coarse-graining and lossy compression place new constraints on the nature of evolution.\n\nLectures Three and Four: Social Feedback\n\nFrom the emergence of the first strands of RNA to the invention of multicellularity, the evolution of life is marked by major transitions. No less so the evolution of our social and cognitive worlds, as they develop from the animal societies we see in television documentaries to the world- and soloar-system-spanning civilizations of the 21st Century. From the first awareness and use of group-level social facts to the emergence of norms and their self-assembly into normative bundles, each transition represents a new relationship between the individual and the group. At the center of this relationship is the use of coarse-grained information gained via lossy compression. I’ll provide key examples of these different stages using high-resolution data on two model systems: the highly-social monk parakeets, and the global community of Wikipedia editors. I’ll present new mathematical tools that you can use to analyse the social world, and connect them to some of the core traditions in the study of complex systems.\n\nLaurent Hebert-Dufresne, Statistical Physics and Complex Networks\n\nWe will discuss the increasingly central role of statistical physics in network theory. This will involve going over some standard tools of statistical physics applied to network problems --- for instance the description of growing social networks and the spread of infectious diseases --- and we will see how this different modelling philosophy often provides a unique perspective. In so doing, we will compare the statistical physics approach to the mathematical and computer science approaches to classical graph theory.\n\nEric Libby Microbial Ecology\n\nMy lectures will be an overview of microbial ecology with the intent to generally educate and highlight open areas of research.\n\nOle Peters, Ergodicity Economics\n\n1 Basic concepts\n1.1. Tossing a coin\nWe start by introducing a simple coin tossing game to illustrate the meaning of the expectation value. The coin tossing game is the multiplicative binomial process, studied e.g. by Redner (1990). A coin is tossed, and on heads the wager increases by 50%, on tails 40% of the wager is lost. The interesting property is that the expectation value of the wager grows exponentially under multiplicative repetition, whereas in the long run wealth shrinks exponentially with probability 1. This is to motivate the importance of using the appropriate tools – sometimes the expectation value may be meaningful, but in many important situations in economics it is irrelevant and misleading.\n\n1.2 Brownian motion (BM) and Geometric Brownian motion (GBM)\nThis sets out the basic mathematical model for what follows. Although BM itself is not ergodic, rates of change (over finite time) are ergodic. GBM is not ergodic, nor are rates of change under GBM, exponential growth rates (over finite time) are ergodic. GBM is a natural null model for many economic processes: self-reproducing quantities, such as money, are multiplicative, and an analogue to the additive Gaussian central limit theorem leads to many multiplicative random models converging to GBM. The expectation value is an ensemble average. Because of the way ergodicity is broken in GBM, the ensemble average has one meaning and the time average has another. Observing a single realization for a long time reveals a time-average growth rate, whereas observing the average over a large ensemble reveals the growth rate of the expectation value. The precise meaning of the two growth rates will be discussed.\n\n2 Individuals\n2.1 Decision theory\nDecision theory is re-developed. How should an individual decide whether to take some gamble (the usual way of phrasing decision problems in economics)? We solve typical decision problems (gamble evaluation) by considering the time-average growth rate (or the [time- and ensemble-] average of the ergodic growth rate) under multiplicative dynamics. The construction of an ergodic observable motivates the introduction of a non-linear function that encodes the dynamics. This function is historically called the “utility function”.\n\n2.2 The St Petersburg paradox\nThe classic St Petersburg paradox, in which people are observed to decline a gamble with a diverging expected value, is resolved using time averages. The expectation value is irrelevant for an individual making decisions. Assuming multiplicative repetitions, the relevant (ergodic) observable is the exponential growth rate. This behaves fundamentally differently from the expectation value and does not diverge for the St Petersburg game.\n\n2.3 Insurance\nThe insurance problem is resolved. In classical economics insurance poses a puzzle: the insurer has to charge at least as much as the expected loss for an insurance contract, whereas the insurance buyer shouldn’t pay more than the expected loss. Hence there is no price at which both parties should sign. Classical economics resolves the problem by introducing psychological arguments of risk aversion, encoded in utility functions. Insurer and insurance buyer are treated separately. We resolve the problem by computing time average growth rates for both parties. A range of prices for the contract is identified that increases the time average growth rates of both parties – under the far-from equilibrium model of GBM a win-win situation exists for a range of mutually beneficial prices.\n\n3 Populations\n3.1 Every man for himself\nIndividual wealth dynamics are modeled as GBM. This implies dynamics for the distribution of wealth. Without interaction between individuals, the distribution of relative wealth (proportions of total wealth) broadens indefinitely, with wealth condensing into the hands of a small minority.\n\n3.2 Cooperation\nInteraction between individuals can be beneficial. This was anticipated in the insurance problem: if the wealths of two individuals follow GBM, the individuals can both do better by pooling and sharing resources periodically. Both individuals will experience larger (time-average) growth rates because of a reduction of the noise amplitude that tends to diminish wealth under GBM. In this sense, cooperation is beneficial (again, this is unclear from the perspective of current mainstream economic theory).\n\n3.3 Taxation\nA centrally organized form of cooperation as defined above (the periodic pooling and sharing of resources) is taxation. Simple stochastic models of a population that pools and redistributes a proportion of wealth or income reveal the following deep insight: a critical taxation rate exists. Below the critical level inequality increases indefinitely (wealth condensation). Above the critical taxation rate the wealth distribution stabilizes in the long-time limit. This is demonstrated by solving for the moments of SDEs similar to GBM.\n\n4 Markets\n4.1 Optimal leverage for stock market investments\nGBM is a popular model for stock price dynamics. The following question arises: if an investor can choose how much of his (risk-free) money to invest in a GBM process, what is the optimum proportion? Considering expectation values there is no optimum – the investor should borrow as much as he can and invest everything in the stock market. This inevitably leads to bankruptcy as fluctuations diverge. Considering the time average growth rate, an optimum exists. Fitting the GBM model to real stock market data, the optimal leverage is found to be close to 1.\n\n4.2 Stochastic market efficiency\nA stability argument suggests that optimal leverage close to 1 is no coincidence. If it were larger, it would be optimal – for any investor – to borrow and leverage up. But this cannot be done by all investors because someone has to provide the funds. A market environment with optimal leverage greater than 1 is identified as unstable, a bubble in the making. The converse is true for optimal leverage below zero. Good economic policy and other dynamical factors would lead to optimal leverage being 1. This is akin to all resources being productively deployed.\n\n4.3 Solving the equity premium puzzle\nA persistent problem in economics is determining the equity premium. This is the difference in the drift term of a risky asset (e.g. the stock market) and the drift term of a risk-free asset (e.g. government bonds). It is known that such a difference exists, but no reasonable theory exists for determining its magnitude. The problem was first pointed out by Mehra and (economics Nobel Laureate) Prescott in 1985. It stands as one of the most significant unresolved puzzles in asset pricing and modern economics. Assuming Stochastic Market Efficiency, the solution of the puzzle is simple. An expression for optimal leverage was derived in 4.1. Setting this expression equal to 1, in accordance with 4.2, produces a simple expression for the equity premium in terms of market volatility.\n\nEleanor Power Social theory, social complexity, and social networks\n\nWhat happens when our complex systems involve actors that are not cellular automatons or microbes, but conscious, reflective humans? when they have some awareness of what the outcomes of their actions might be, a sense of their position relative to others, and a representation of the larger social entities of which they are a part? In order to understand human social complexity, we need to understand something about how humans operate. To that end, we will first go over some of the fundamentals of social theory, looking at how various theorists have understood how individual action both shapes, and is shaped by, social structure. Having understood some of the critical dynamics of social interaction, in lecture two we will grapple with perhaps a more fundamental topic: the emergence of human social complexity. How can we explain the origins of sedentism? the domestication of plants and animals? the development of social and political institutions (marriage, kinship, religion, property rights)? the advent of state society? This will have us turn to the archaeological record to study some of the crucial transitions in human history. In the final lecture, we will discuss some of the contemporary approaches to these questions of social complexity. We will focus in particular on one of the most promising methodological tools being used today: social network analysis. Focusing on some examples of current scholarship, we will see how some of these fundamental questions of human sociality and complexity are shaped into meaningful, and feasible, research questions.\n\nRajiv Sethi, Agent-Based Computational Economics\n\nThese lectures will provide an introduction to agent-based computational modeling, drawing on applications in economics and finance. The first lecture will focus on the manner in which decentralized, uncoordinated choices can give rise to emergent properties such as residential segregation. The second and third lectures will examine financial markets, with a focus on how asset price dynamics depend on the composition of trading strategies, and how the composition of strategies itself evolves under pressure of differential profitability.\n\nL S Shashidhara, Development of body plan\n\nDuring development, relatively simple single-cellular embryo grows into a complex multicellular organism. The emergence of complexity is the result of a series of hierarchical events. I will discuss few simple rules that set developmental patterns during animal development. Built on these foundations, are the changes that have lead to the evolution of multiple forms.\nSitabhra Sinha, Complexity in physiological systems\n\nPatterns of life and death: Complex spatio-temporal dynamics in nonlinear biological systems\n\nSitabhra Sinha\nThe Institute of Mathematical Sciences, CIT Campus, Taramani, Chennai\n600113, India\nE-mail: sitabhra@imsc.res.in\nURL: http://www.imsc.res.in/~sitabhra/\n\nSpatially coherent waves of activity are critical for the proper functioning of different biological organs, in particular, the heart and the pregnant uterus. In the uterine system, physiological changes that are not yet well-understood take place through the course of pregnancy that eventually lead initially transient excitations to give way to system-wide macroscopic contractions immediately preceding birth. Using models that include excitable and passive cells, we are trying to understand the mechanism that results in these dynamical transitions.\n\nR. Singh, J. Xu, N. G. Garnier, A. Pumir and S. Sinha, \"Self-organized\ntransition to coherent activity in disordered media\", Phys. Rev. Lett.\n108 (2012) 068102.\n\nPhysics of the Heart: Controlling nonlinear waves during cardiac arrhythmia\n\nSitabhra Sinha\nThe Institute of Mathematical Sciences, CIT Campus, Taramani, Chennai\n600113, India\nE-mail: sitabhra@imsc.res.in\nURL: http://www.imsc.res.in/~sitabhra/\n\nThe heart, one of the most vital organs of the human body, has to have regular contractions under normal circumstances - any disruption of the natural rhythm can lead to one of several types of arrhythmia, some of which can be potentially fatal. Spiral waves and their subsequent breakup into spatiotemporal chaos have been associated with certain life-threatening arrhythmia, such as ventricular tachycardia and fibrillation. Currently most effective therapies for such cardiac disorders involve applying large electrical shocks that have damaging side-effects. We are trying to develop more efficient chaos-control based strategies for terminating arrhythmia by studying the role of sub-threshold stimulation and tissue heterogeneities (such as inexcitable obstacles and excitability gradients) on the dynamics of spiral waves and spiral chaos states.\n\nS. Sridhar et al, \"Suppression of cardiac alternans by alternating-period-\nfeedback stimulations\", Phys Rev E 87 (2013) 042712.\n\nS. Sridhar and S. Sinha, \"Response to sub-threshold stimulus is\nenhanced by spatially heterogeneous activity\", Europhys. Lett. 92\n(2010) 60006.\n\nS. Sridhar and S. Sinha, \"Controlling spatiotemporal chaos in excitable\nmedia using an array of control points\", Europhys. Lett. 81 (2008) 50002\n\nS. Sinha, A. Pande and R. Pandit, \"Defibrillation via the elimination of spiral\nturbulence in a model for ventricular fibrillation\", Phys. Rev. Lett.\n86 (2001) 3678\n\nAndreas Wagner, Evolution and genotype networks\n\nAfter a brief survey of important milestones in the history of evolutionary biology, these lectures will turn to the most fundamental problem of the field, namely how evolution creates new and beneficial features of organisms. This “innovation problem” has recently been tackled in different classes of complex molecular systems, including chemical reaction networks in metabolism, regulatory gene circuits, as well as protein and RNA macromolecules. I will discuss these efforts, the progress that has been made, and introduce the important role genotype networks play for innovation in all these systems. I will also touch upon other important tensions in modern evolutionary biology that relate to the innovation question, such as that between neutral and selected change, as well as that between a system’s robustness and its innovation ability. Time permitting, I will also discuss how recent insights into the innovation problem in biology could apply to technological evolution.\n\n\nJuniper Lovato, Director of Education, Santa Fe Institute", "pred_label": "__label__1", "pred_score_pos": 0.9974000453948975} {"content": "December 16, 2015\n\nJust Launched! — Better Feature Prioritization Using the Fibonacci Sequence\n\nby Keith Brown\n\nManaging the backlog and prioritizing features are among the most important jobs of a product manager. By prioritizing the right features, you can ensure that your team will focus on what matters most for achieving your overall vision and goals.\n\nBut keeping your team focused on what matters most is difficult. That’s why we created the Aha! Scorecard to help.\n\nScorecards allow you to create simple or advanced equations which map back to your strategic initiatives, allowing you to rank the importance of each feature.\n\nAnd today’s launch will empower your team to more effectively manage your backlog and prioritize your features. We have done this by introducing additional scales and metrics for all scorecards — including the Fibonacci Sequence which many of you have requested.\n\nNote that you need to be an Aha! admin to create and update Scorecards. Here’s how the new scoring options work:\n\nAlign prioritization with product strategy\nYour scorecard contains key metrics which can help you align your work back to your overall product strategy and goals. You could already fully customize scorecards under Account Settings including: metrics, scale, weighting, and complexity used to add quantification to your features. And today we have added even more options.\n\nAha! now supports the Fibonacci Sequence. The name may sound complex, it is a powerful way to score ideas and features because value and effort is rarely ever linear. The Fibonacci Sequence is a series of numbers where each number is the sum of the previous two (0, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144…).\n\nBy using this scale, your scorecards become even better at helping you prioritize what matters. As the score grows, the numbers become further and further apart. That means you have easier decisions when scoring features on your scale with scores of 13 vs. 21. It’s much easier than deciding between scores of 13 vs. 14, right?\n\nAha! also now supports scorecards using Powers of 2 (shown below). This sequence type is another exponential series of numbers where each number is two times greater than the previous (0, 1, 2, 4, 8, 16, 32, 64, 128…).\n\nUsing Powers of 2 provides a similar benefit as the Fibonacci Sequence. It helps teams to recognize the higher value and uncertainty that comes with more complex requirements, and reduces confusion when prioritizing features.\n\nHave a prioritization system unique to your business? Aha! can also be customized with scales and equations beyond even these two scales. In addition to the Fibonacci Sequence and Powers of 2 methods, you can create your own custom scale for scoring features.\n\nNote that if you change your existing Scorecards to use the new scoring methods, your existing features that have already been scored will keep their existing values until you adjust their scores.\n\nEffectively manage the product backlog\nUsing your new custom scorecards, you can score ideas and features on the key criteria to empower you to rank the overall importance and relative effort for each feature.\n\nAs you score each of the features, you can use the Features board to effectively manage your backlog of potential features and prioritize them against one another. The Features board is the perfect place to drag, drop, and order these features based on priorities.\n\nEach product can have a unique scorecard comprised of metrics that reflect your strategy, but make sense at a feature level.\n\nAnalyze scores across multiple features\nOnce scores are set, you can report on your priorities across a list of ideas or features. This is done by building a report using Aha! with detailed views into the breakdown of feature scores. In the list view below you can see each feature, its overall score, and each metric that makes up that score.\n\nFeature prioritization is a key job for product managers. Efficient requirements management takes skill even in single product /single target market companies. But in more complex organizations, it takes real expertise.\n\nIntroducing the Fibonacci Sequence (and additional best practice scoring methodologies) allows product managers to more effectively score and prioritize features.\n\nUltimately, this allows you to better manage your backlog.\n\nSignup for a free Aha! trial — be happy\nBetter backlog management and feature prioritization is available for all Aha! customers. If you are not already an Aha! customer, you may want to sign up for a free 30 day trial of Aha! now to see why over 30,000 users trust Aha! to set product strategy, create visual roadmaps, prioritize features, and capture ideas.\n\nKeith Brown\n\n\n\nFollow Keith\n\nFollow Aha!\n\nRelated articles\n\n\nStart your free 30-day trial\n\n© 2021 Aha! Labs Inc.All rights reserved", "pred_label": "__label__1", "pred_score_pos": 0.9639017581939697} {"content": "I paint representations of disembodied heads of people in my social circle and sometimes scrawl text directly over their likenesses. That text is often tinged with dry humor, at times it is politically incorrect, and is regularly derived from the spoken vernacular of the communities I have lived in. My overarching goal is to share with diverse audiences what I see as worthwhile subject matter. That might include religious symbolism or popular slang. I make pictures to document select parts of my life.\n\nMany of us have immediate psychological connections to representations of the human face. We look for similarities between ourselves and those represented; note key differences between “us” and “them.” “He looks like so-and-so.” “She reminds me of whatshername.” Assumptions or questions about the subject’s state of mind usually follow. If the expression that the subject wears is ambiguous enough, we might begin to project our own emotions onto them to interpret the painting’s message.\n\nI choose specific models as a way of recognizing their significance in my life’s path. I relish being able to honor everyday people through making images. We regularly celebrate women and men of prominence in mass media, so I take advantage of the opportunity to highlight the people that impact me on a more direct level than any untouchable celebrity or distant historical figure could. I integrate text and other symbols into the portrait work to narrow the subject matter to a certain degree and complicate the viewer’s understanding of the portrait subject’s identity. The work begins as an intimate acknowledgement of an individual and is subsequently transformed into a set of symbols poised for the viewer’s investigation.\n\n\nWilliam Paul Thomas is a visual artist based in Durham, North Carolina.  His work is centered on making images to record his life experiences and observations, with an approach that defies standard documentary practices. For over 10 years he has created intimate painted portraits of everyday people that he chooses as a way of recognizing their significance in his life’s path. In addition to painting and drawing, he also experiments with video and photography to capture idiosyncratic, abstracted depictions of love, joy and adversity.  He earned a BFA in Studio Art from the University of Wisconsin-Whitewater and an MFA from the University of North Carolina-Chapel Hill.", "pred_label": "__label__1", "pred_score_pos": 0.9995482563972473} {"content": "Public Release: \n\nFound in translation\n\nUSC scientists find there is something universal about what occurs in the brain when it processes stories, regardless of a person's origin or language\n\nUniversity of Southern California\n\n\nIMAGE: English, Farsi and Mandarin readers use the same parts of the brain to decode the deeper meaning of what they're reading view more \n\nCredit: Morteza Dehghani, et al.\n\n\nAnd in what appears to be a first for neuroscience, USC researchers have found patterns of brain activation when people find meaning in stories, regardless of their language. Using functional MRI, the scientists mapped brain responses to narratives in three different languages -- English, Farsi and Mandarin Chinese.\n\n\n\"Even given these fundamental differences in language, which can be read in a different direction or contain a completely different alphabet altogether, there is something universal about what occurs in the brain at the point when we are processing narratives,\" said Morteza Dehghani, the study's lead author and a researcher at the Brain and Creativity Institute at USC.\n\n\n\nMaking sense of 20 million personal anecdotes\n\n\n\nUsing state-of-the-art machine learning and text-analysis techniques, and an analysis involving over 44 billion classifications, the researchers were able to \"reverse engineer\" the data from these brain scans to determine the story the reader was processing in each of the three languages. In effect, the neuroscientists were able to read the participants' minds as they were reading.\n\nThe brain is not resting\n\nIn the case of each language, reading each story resulted in unique patterns of activations in the \"default mode network\" of the brain. This network engages interconnected brain regions such as the medial prefrontal cortex, the posterior cingulate cortex, the inferior parietal lobe, the lateral temporal cortex and hippocampal formation.\n\n\n\"One of the biggest mysteries of neuroscience is how we create meaning out of the world. Stories are deep-rooted in the core of our nature and help us create this meaning,\" said Jonas Kaplan, corresponding author at the Brain and Creativity Institute and an assistant professor of psychology at USC Dornsife.\n\n\nStudy co-authors include corresponding author Antonio Damasio, co-director of the Brain and Creativity Institute; Mary Helen Immordino-Yang, Reihane Borgati and Kingson Man, all from the Brain and Creativity Institute. Other co-authors were Andrew Gordon of the USC Institute for Creative Technologies and Ashish Vaswani of Google Brain.\n\nThe research is supported by the Institute for New Economic Thinking and the Defense Advanced Research Projects Agency (grant number D12AP00069).\n", "pred_label": "__label__1", "pred_score_pos": 0.9355123043060303} {"content": "Home / Channel / Science / Scientists claim time travel is impossible: but is it?\n\nScientists claim time travel is impossible: but is it?\n\nScience Fiction fans will be saddened to hear that we won’t be traveling through time, well at least not according to a group of Hong Kong scientists, who claim that their research proves it is impossible.\n\nThe team, which is based at the Hong Kong University of Science and Technology have said that it is just impossible for single photons to travel faster than the speed of light inside a vacuum. They will obey the laws of physics.\n\nNo, its not the new Nintendo video console controller\n\nProfessor Shengwang Du said in a statement “The results add to our understanding of how a single photon moves. They also confirm the upper bound on how fast information travels with light. By showing that single photons cannot travel faster than the speed of light, our results bring a closure to the debate on the true speed of information carried by a single photon. Our findings will also likely have potential applications by giving scientists a better picture on the transmission of quantum information.”\n\nThis dismisses the discovery of “superluminal propagation of optical pulses” which claimed that a group of optical pulses could move faster than the speed of light. Du’s group of scientists measured the maximum speed of a single photon and it obeyed the speed limit laid out in the laws of physics. He said it “confirms Einstein’s causality; that is, an effect cannot occur before its cause.”\n\nPublication SALON have a different take on the topic however and they claim that it may still be possible thanks to a phenomenon known as ‘time dilation’.\n\n“Your velocity in space and time are inversely related, as dictated by Einstein’s theory of special relativity. Columbia physicist Brian Greene explains this weird feature of “space-time” in his seminal book, “The Elegant Universe”:\n\nWhen an object moves [faster] through space relative to us, its clock runs slow compared to ours. That is, the speed of it’s motion through time slows down.”\n\nThey continue, saying “Time isn’t an absolute; it’s relative (hence “special relativity”). Your travel through time is malleable and manipulatable. And you can change how you experience it — albeit, ever so slightly — just by walking at a brisk pace.”\n\nIf you are starting to get lost, then they have published a theoretical example\n\n“Let’s say you board a spaceship equipped with a rocket engine so powerful that you can travel at nearly the speed of light. And, let’s say you keep up this velocity, traveling away from Earth for what feels like six months; and then you turn around and head back toward Earth, which takes another six months. When you arrive back on our home planet, what you’ll find is that eons have passed. And who knows what you’ll find. Maybe everyone’s eating food in capsule form. Or maybe people are gone entirely, the whole of human history exhausted. While you’ve barely aged at all, the world as you knew it has changed quite a bit. Thus, time travel.”\n\nKitguru says: Time Travel is an unknown factor but we have always been interested in teleportation. Imagine being able to travel thousands of miles in an instant, without having to sit beside some sweaty overweight dude on a plane for 12 hours!\n\nBecome a Patron!\n\nCheck Also\n\nJames Mods: Electroplating At Home (How To Guide!)\n", "pred_label": "__label__1", "pred_score_pos": 0.8554500341415405} {"content": "\n\npatellar subluxation\n\n\npatellar dislocation\n\n\n\nCauses of patellofemoral instability\n\nThe patella may be unstable for a number of reasons. There may be local reasons related to the patella, such as patella alta, or related to the trochlear groove, such as trochlear dysplasia. There may also be remote causes in the hip or the foot - such as rotational deformities.\n\npatellar instability\nkneecap instability\n\nThe unstable patella\n\n\nEditor's interpretation of a paper published in the medical literature.\n\nPatellar instability and dislocation\n", "pred_label": "__label__1", "pred_score_pos": 0.8009668588638306} {"content": "\n\nJames Gang\n\nJames Gang were a rock band formed in Cleveland, Ohio in 1966. Though the band was not a huge commercial success, except in the Northeast Ohio area, the fame garnered by guitarist Joe Walsh has since made the group more notable.", "pred_label": "__label__1", "pred_score_pos": 0.5955747365951538} {"content": "INFORMATION GATHERED BY www.mahmoodandsons.com. This is www.mahmoodandsons.com’s (“www.mahmoodandsons.com”) online privacy policy (“Policy”). This policy applies only to activities www.mahmoodandsons.com engages in on its website and does not apply to www.mahmoodandsons.com’s activities that are “offline” or unrelated to the website.\n\n\nwww.mahmoodandsons.com collects certain anonymous data regarding the usage of the website. This information does not personally identify users, by itself or in combination with other information, and is gathered to improve the performance of the website. The anonymous data collected by the www.mahmoodandsons.com website can include information such as the type of browser you are using, and the length of the visit to the website. You may also be asked to provide personally identifiable information on the www.mahmoodandsons.com website, which may include your name, address, telephone number and e-mail address. This information can be gathered when feedback or e-mails are sent to www.mahmoodandsons.com, when you register for services, or make purchases via the website. In all such cases you have the option of providing us with personally identifiable information.\n\n\n\n\n\n\nCOOKIES. Cookies are small bits of data cached in a user’s browser. www.mahmoodandsons.com utilizes cookies to determine whether or not you have visited the home page in the past. However, no other user information is gathered.\n\n\nwww.mahmoodandsons.com may use non-personal “aggregated data” to enhance the operation of our website, or analyze interest in the areas of our website. Additionally, if you provide www.mahmoodandsons.com with content for publishing or feedback, we may publish your user name or other identifying data with your permission.\n\n\nwww.mahmoodandsons.com may also disclose personally identifiable information in order to respond to a subpoena, court order or other such request. www.mahmoodandsons.com may also provide such personally identifiable information in response to a law enforcement agencies request or as otherwise required by law. Your personally identifiable information may be provided to a party if www.mahmoodandsons.com files for bankruptcy, or there is a transfer of the assets or ownership of www.mahmoodandsons.com in connection with proposed or consummated corporate reorganizations, such as mergers or acquisitions.\n\n\n 1. SECURITY. www.mahmoodandsons.com takes appropriate steps to ensure data privacy and security including through various hardware and software methodologies. However, www.mahmoodandsons.com cannot guarantee the security of any information that is disclosed online.\n\n\n\n\nMINORS. www.mahmoodandsons.com does not knowingly collect personal information from minors under the age of 18. Minors are not permitted to use the www.mahmoodandsons.com website or services, and www.mahmoodandsons.com requests that minors under the age of 18 not submit any personal information to the website. Since information regarding minors under the age of 18 is not collected, www.mahmoodandsons.com does not knowingly distribute personal information regarding minors under the age of 18.\n\n\nCORRECTIONS AND UPDATES. If you wish to modify or update any information www.mahmoodandsons.com has received, please contact info@mahmoodsons.com.\n\n\nBack to Top", "pred_label": "__label__1", "pred_score_pos": 0.9324310421943665} {"content": "Office Decor Ideas\nHow to Make the Office Great Again\n\nHow to Make the Office Great Again\n\nAn office is not just a location, it’s a place to go to get your work done. The space has to overcome several obstacles and tick the boxes on an extensive list of necessary components which vary depending on the type and style of business it caters for.\n\nThe company’s vision and culture should determine the office layout and specific features. Unfortunately, in a finite world of budgetary and spatial restrictions, a company may be limited in its ability to achieve maximum results. It’s not just about scope for imagination. The real world has limitations, but making smart choices and implementing innovative designs within the workplace will transform the office into a versatile hub of productivity.\n\nNow, how do you make the office great again?\n\nWhat you think you need\n\nYou could build a feature wall and add a bold mural of Donald Trump, but, seriously, don’t do that. Plus, he is so yesterday’s news and since Andy Warhol is dead Trump’s probably not popular artistic material to plaster on that wall. Although tempting as an interesting social experiment, he won’t inspire productivity.\n\nAnd you might be tempted to redesign the office space concept from scratch, but in so doing, you are wasting time and resources which a sound business model should always avoid. Why not learn from others’ attempts to create the best office environment?\n\n\nDissecting the ‘office of yesterday’ prototype\n\nYou can learn from history, and by rebuilding the office place from scratch, you are dismissing historical prototypes completely. Yes, there are flaws in that traditional model, but there are good points to take away from it as well. Even the failures have helpful take-away points to learn from. So keep in mind what you like from past prototypes and what you don’t like.\n\nThe 1950-60s. Open-plan factory floors with desks placed nearby each other during the 50s, and in the 60s, cramped, three-sided cubicles in a large, open room with the warmth and personality of a warehouse, the smell of stale smoke and cinders of the staple ashtray on every desk.\n\nThe 1980-90s. Flash forward to the 80s when the office décor moved to cool neutral tones of grey concrete and stark white walls and ceilings, where the idea of green in the office meant a splash of colour from a fake pot-plant or a woman’s rayon blouse. If the movie Die Hard is a realistic representation of the 80s office, which I like to think that it is, then the 80s office was party central and the open spaces were great to host departmental shindigs.\n\nIf you were somebody in the hierarchy, you got your own office of some description. Maybe you had a window looking out onto the world if only the adjacent parking lot; or, if Office Space is a true indication of the 90s, and it is, maybe the only window you had was the Microsoft Windows logo on your computer or the internal glass window making your office space transparent to your underling colleagues.\n\nEvery decade seems to have their own versions of the open-plan office focusing on different aspects, such as keeping an eye on employees, boosting productivity, or inter-office collaboration. But do you need Big Brother looking over you, micro-managing your every move? No. Bringing back the open-plan space needs to have a vital impact that fits into your decade for your generation.\n\n\nEnvisioning the ‘office of the future’ prototype\n\nWhat will open-plan mean for the future workplace? You could let your imagination go wild here. There are many popular media sources to draw fantastical conclusions on life in the future, such as The Jetsons, with flying cars and robot servants, Star Trek with the office-life taking place in a spaceship, to Minority Report with tech bugs infiltrating buildings to scan vital statistics, to The Matrix and crazy-real, virtual reality.\n\nEven Google’s 2000-something campuses, with celebrity speakers, endless daily perks, such as free meals and the complete village of professional health and wellness services boggle the mind’s crazy concept of the future’s corporate office space. But in-house cafés, on-campus doctor’s offices and shuttle services are out of reach for anyone but the elite few powerhouse giants.\n\nConsider your workforce\n\nWhat works for some people doesn’t work for others. This has to be one of the top considerations for any forward-thinking office redesign plan. Considering the people who work for you is central to your design concepts. Get their opinions. Ask them directly, ‘What do you need? How do you work best?’\n\nFinding out from your particular workforce the features and creature comforts that bring out the best in them has to be your starting point. Ask them to envision the perfect workplace, their optimum workspace, and what they like most about their home environment.\n\nRecreating the ‘home office’ prototype\n\nWhere do they spend their free time at home? When they have to work from home, an ever-increasing change in the normal lifestyle, where do they go to be most comfortable and most productive? Do they sit in the open-plan kitchen-dining-living space, the heart of the home? Or, do they retreat to the quiet, enclosed study for some creative respite?\n\nPeople are a company’s most valuable and versatile asset. It makes great sense to model your office plan after them and what they need to achieve optimum productivity. Keeping your workforce happy and healthy is crucial to your company’s happiness and wellbeing.\n\n\nCreating the ‘evolving office’ prototype\n\nWhat this looks like might surprise you because it is a hybrid model that adopts aspects from all of the above prototypes. Versatility is key. If you can harness this elusive concept, you will have the ideal workspace that aligns with budgetary and spatial restrictions that are almost certainly factors at play.\n\nQuiet, enclosed office spaces. Your new office space should incorporate small, closed office spaces with hot desks, even work pods, that provide quiet reflection for concentration, much like a University’s library’s study rooms, or the home office.\n\nAlso having quiet rooms available and able to function as quiet places where you can have private conversations, phone or video chats with clients is a handy resource.\n\nTeam meeting spaces. Larger rooms that can be closed off or enlarged for team projects, big enough to house whiteboards and other project tools, like UHD display screens.\n\nOpen-plan hub. You need to have an open plan area where everyone comes together to brainstorm, collaborate, hang out and eat, and can also be utilised as a meet-and-greet, mixer space for the company. This is likely the most versatile space and will take up the majority of your office floor plan. This space is the heart of the office like the open-plan kitchen/dining/living is the heart of the home.\n\nWorkstation areas. Provide a collective space for team workstations. This might be an open-plan space for each team, department, or the entire company, depending on its size and needs.\n\nstand-up desks\n\nFeatures of the ‘versatile office’ space\n\nMoveable, sliding walls to alter workroom sizes can make even enclosed areas adjustable. Promote wellness with features such as stand-up desks to promote better personal health and fitness, a light workout room for some yoga, meditation, stationary cycling, and stretching, or a gym if you’re able. Supplying shower rooms for those who work out at lunch or cycle to work show that you put your stamp of approval on fitness.\n\nMix up the café space with a combination of tall bar leans and sit-down tables. Provide an entertainment space with couches and comfy chairs to hang out on break, packed with some fun features like video gaming, foosball or table tennis, or even a couple of board or card games, tactile puzzles, and such.\n\nIn conclusion\n\nMaking the office environment a great place to work again as an innovative, creative, productive, and healthy workplace means blending the old with the new. Retrofit by taking a little from column A and a little from column B. Determine what your company’s needs are by asking the people who work there what their needs are. You’ll end up with a versatile office space that meets the needs of now and grows with you into the future.\n\nHow to Make the Office Great Again was last modified: by", "pred_label": "__label__1", "pred_score_pos": 0.7759777307510376} {"content": "For Rachael\n\nFor Rachael was years in production, and Colby didn’t even know it. In the summer of 2012, Colby worked as a pedi caber. Simultaneously, he started dating someone, Rachael. While biking people around Newport, RI, he filmed customers and asked them all the same question - “what’s your definition of love?”\n\nOver the years, Colby and Rachael’s relationship grew, and that pedicab footage (which was collecting dust for awhile) started to take on new meaning. For Rachael, is Colby’s realization of the answer to that question and the story of his proposal in a beautiful sunflower field.", "pred_label": "__label__1", "pred_score_pos": 0.9965030550956726} {"content": "Get Barn Swallow Migration In India PNG\n\nGet Barn Swallow Migration In India PNG. It is a distinctive passerine bird with blue upperparts and a long, deeply forked tail. Young stay with their parents during.\n\nIBRCE: Pouring Rain-ging!\nIBRCE: Pouring Rain-ging! from\n\nInternal migration spurred primarily by employment and marriage helps shape the economic, social, and political life of india's sending and receiving regions. It is found in europe, asia, africa and the americas. A flock of barn swallows (hirundo rustica) on a power line, seefelden near unteruhldingen, lake constance, germany/credit:\n\nДля просмотра онлайн кликните на видео ⤵.\n\nObservations and band recoveries suggest that the bulk of the north american barn swallow population migrates through the central american isthmus although. Learn more about this widely this most widely distributed and abundant swallow in the world is familiar to birders and nonbirders. Barn swallow hirundo rustica in flight above farmland. This is the most widespread species and national bird of estonia.", "pred_label": "__label__1", "pred_score_pos": 0.6977701187133789} {"content": "Pronunciation /ɔːrɡəˈnɛl/\nPart of Cell\nLatin Organella\nMeSH D015388\nTH H1.\nFMA 63832\nAnatomical terms of microanatomy\n\n\nOrganelles are identified by microscopy, and can also be purified by cell fractionation. There are many types of organelles, particularly in eukaryotic cells. They include structures that make up the internal endomembrane system (such as the nuclear envelope, endoplasmic reticulum, and Golgi apparatus), and other structures such as mitochondria and plastids. While prokaryotes do not possess eukaryotic organelles, some do contain protein-shelled bacterial microcompartments, which are thought to act as primitive prokaryotic organelles;[1] and there is also evidence of other membrane-bounded structures.[2] Also, the prokaryotic flagellum which protrudes outside the cell, and its motor, as well as the largely extracellular pilus, are often spoken of as organelles.\n\nHistory and terminology [ edit ]\n\nCell biology\nThe animal cell\nAnimal Cell.svg\n\nIn biology organs are defined as confined functional units within an organism.[3] The analogy of bodily organs to microscopic cellular substructures is obvious, as from even early works, authors of respective textbooks rarely elaborate on the distinction between the two.\n\n\nCredited as the first[5][6][7] to use a diminutive of organ (i.e., little organ) for cellular structures was German zoologist Karl August Möbius (1884), who used the term organula (plural of organulum, the diminutive of Latin organum).[8] In a footnote, which was published as a correction in the next issue of the journal, he justified his suggestion to call organs of unicellular organisms \"organella\" since they are only differently formed parts of one cell, in contrast to multicellular organs of multicellular organisms.[8][9]\n\nTypes [ edit ]\n\n\n\n\nA second, less restrictive definition of organelles is that they are membrane-bound structures. However, even by using this definition, some parts of the cell that have been shown to be distinct functional units do not qualify as organelles. Therefore, the use of organelle to also refer to non-membrane bound structures such as ribosomes is common and accepted.[14][15][16] This has led many texts to delineate between membrane-bound and non-membrane bound organelles.[17] The non-membrane bound organelles, also called large biomolecular complexes, are large assemblies of macromolecules that carry out particular and specialized functions, but they lack membrane boundaries. Many of these are referred to as \"proteinaceous organelles\" as their main structure is made of proteins. Such cell structures include:\n\nThe mechanisms by which such non-membrane bound organelles form and retain their spatial integrity have been likened to liquid-liquid phase separation.[18]\n\nEukaryotic organelles [ edit ]\n\n\n\nMajor eukaryotic organelles\nOrganelle Main function Structure Organisms Notes\ncell membrane separates the interior of all cells from the outside environment (the extracellular space) which protects the cell from its environment. two-dimensional liquid all eukaryotes\ncell wall The cell wall is a rigid structure composed of cellulose that provides shape to the cell, helps keep the organelles inside the cell, and does not let the cell burst from osmotic pressure. cellulose plants, protists, rare kleptoplastic organisms\nflagellum locomotion, sensory protein some eukaryotes\n\n\nMinor eukaryotic organelles and cell components\nOrganelle/Macromolecule Main function Structure Organisms\nacrosome helps spermatozoa fuse with ovum single-membrane compartment most animals\ncilium movement in or of external medium; \"critical developmental signaling pathway\".[21] Microtubule protein animals, protists, few plants\ncnidocyst stinging coiled hollow tubule cnidarians\nglyoxysome conversion of fat into sugars single-membrane compartment plants\nmelanosome pigment storage single-membrane compartment animals\nmyofibril myocyte contraction bundled filaments animals\nnucleolus pre-ribosome production protein-DNA-RNA most eukaryotes\nparenthesome not characterized not characterized fungi\nperoxisome breakdown of metabolic hydrogen peroxide single-membrane compartment all eukaryotes\nstress granule mRNA storage[22] membraneless\n\n(mRNP complexes)\n\nmost eukaryotes\nTIGER domain mRNA encoding proteins membraneless most organisms\nvesicle material transport single-membrane compartment all eukaryotes\n\nOther related structures:\n\nProkaryotic organelles [ edit ]\n\nStructure of Candidatus Brocadia anammoxidans, showing an anammoxosome and intracytoplasmic membrane\n\nProkaryotes are not as structurally complex as eukaryotes, and were once thought as having little internal organization, and lack cellular compartments and internal membranes; but slowly, details are emerging about prokaryotic internal structures that overturn these assumptions.[2] An early false turn was the idea developed in the 1970s that bacteria might contain cell membrane folds termed mesosomes, but these were later shown to be artifacts produced by the chemicals used to prepare the cells for electron microscopy.[24]\n\nHowever, there is increasing evidence of compartmentalization in at least some prokaryotes.[2] Recent research has revealed that at least some prokaryotes have microcompartments, such as carboxysomes. These subcellular compartments are 100–200 nm in diameter and are enclosed by a shell of proteins.[1] Even more striking is the description of membrane-bound magnetosomes in bacteria, reported in 2006.[25][26]\n\nThe bacterial phylum Planctomycetes has revealed a number of compartmentalization features. The Planctomycetes cell plan includes a intracytoplasmic membranes that separates the cytoplasm into paryphoplasm (an outer ribosome-free space) and pirellulosome (or riboplasm, an inner ribosome-containing space).[27] Membrane-bound anammoxosomes have been discovered in five Planctomycetes \"anammox\" genera, which perform anaerobic ammonium oxidation.[28] In the Planctomycetes species Gemmata obscuriglobus, a nucleus-like structure surrounded by lipid membranes has been reported.[27][29]\n\nCompartmentalization is a feature of prokaryotic photosynthetic structures.[2] Purple bacteria have \"chromatophores\", which are reaction centers found in invaginations of the cell membrane.[2] Green sulfur bacteria have chlorosomes, which are photosynthetic antenna complexes found bonded to cell membranes.[2] Cyanobacteria have internal thylakoid membranes for light-dependent photosynthesis; studies have revealed that the cell membrane and the thylakoid membranes are not continuous with each other.[2]\n\nProkaryotic organelles and cell components\nOrganelle/macromolecule Main function Structure Organisms\nanammoxosome anaerobic ammonium oxidation ladderane lipid membrane \"Candidatus\" bacteria within Planctomycetes\ncarboxysome carbon fixation protein-shell bacterial microcompartment some bacteria\nchlorosome photosynthesis light harvesting complex attached to cell membrane green sulfur bacteria\nflagellum movement in external medium protein filament some prokaryotes and eukaryotes\nmagnetosome magnetic orientation inorganic crystal, lipid membrane magnetotactic bacteria\nnucleoid DNA maintenance, transcription to RNA DNA-protein prokaryotes\nplasmid DNA exchange circular DNA some bacteria\nthylakoid membranes photosynthesis photosystem proteins and pigments mostly cyanobacteria\n\nSee also [ edit ]\n\nReferences [ edit ]\n\n 2. ^ a b c d e f g Murat, Dorothee; Byrne, Meghan; Komeili, Arash (2010-10-01). \"Cell Biology of Prokaryotic Organelles\". Cold Spring Harbor Perspectives in Biology. 2 (10): a000422. doi:10.1101/cshperspect.a000422. PMC 2944366. PMID 20739411.\n 9. ^ Walker, Patrick (2009). Nuclear import of histone fold motif containing heterodimers by importin 13. Niedersächsische Staats-und Universitätsbibliothek Göttingen.\n 16. ^ Banani SF, Lee HO, Hyman AA, Rosen MK (May 2017). \"Biomolecular condensates: organizers of cellular biochemistry\". Nature Reviews Molecular Cell Biology. 18 (5): 285–298. doi:10.1038/nrm.2017.7. PMC 7434221. PMID 28225081.\n 18. ^ Brangwynne CP, Eckmann CR, Courson DS, Rybarska A, Hoege C, Gharakhani J, Jülicher F, Hyman AA (June 2009). \"Germline P granules are liquid droplets that localize by controlled dissolution/condensation\". Science. 324 (5935): 1729–32. Bibcode:2009Sci...324.1729B. doi:10.1126/science.1172046. PMID 19460965. S2CID 42229928.\n 23. ^ Tsai Y, Sawaya MR, Cannon GC, Cai F, Williams EB, Heinhorst S, Kerfeld CA, Yeates TO (June 2007). \"Structural analysis of CsoS1A and the protein shell of the Halothiobacillus neapolitanus carboxysome\". PLOS Biology. 5 (6): e144. doi:10.1371/journal.pbio.0050144. PMC 1872035. PMID 17518518.\n 27. ^ a b Lindsay, M. R.; Webb, R. I.; Strous, M; Jetten, M. S.; Butler, M. K.; Forde, R. J.; Fuerst, J. A. (2001). \"Cell compartmentalisation in planctomycetes: Novel types of structural organisation for the bacterial cell\". Archives of Microbiology. 175 (6): 413–29. doi:10.1007/s002030100280. PMID 11491082. S2CID 21970703.\n 28. ^ Jetten, Mike S. M.; Niftrik, Laura van; Strous, Marc; Kartal, Boran; Keltjens, Jan T.; Op den Camp, Huub J. M. (2009-06-01). \"Biochemistry and molecular biology of anammox bacteria\". Critical Reviews in Biochemistry and Molecular Biology. 44 (2–3): 65–84. doi:10.1080/10409230902722783. PMID 19247843. S2CID 205694872. Retrieved 2020-08-03.\n\nExternal links [ edit ]\n\nWhat is this?", "pred_label": "__label__1", "pred_score_pos": 0.800098717212677} {"content": "What do the colors of a bruise mean?\n\nBruises happen when an injury causes blood to leak into the skin. Bruises naturally change color over time from red, through purple, to yellow or brown. Bruises that do not change color may need medical attention. Learn more about why bruises change color, and when to worry about a bruise, here.", "pred_label": "__label__1", "pred_score_pos": 0.9950430989265442} {"content": "Pulse survey vs Organizational Health survey\n\nFebruary 05, 2021\n\nAt Tripod, we are often asked for advice about conducting pulse surveys in organizations. Although in recent years pulse surveys have gained traction and have been on a steady rise in popularity – are they really accomplishing what we need? \n\nThe pulse survey allows the employer to quickly gather data about the engagement of their employees without employees having to spend a large amount of time on filling out lengthy questionnaires or managers using up resources interpreting the results. However, the survey usually only covers a small array of topics amongst a small subset of employees due to its limitations. This may prompt misplaced knee-jerk reactions to negative feedback and misinterpreted information. \n\nAn organization-wide survey, such as the Organizational Health survey offered by Tripod, while more costly and time consuming, can provide a much needed deeper insight into the organization’s highs and lows. A specific set of questions based on scientific literature allows for an easy year-over-year comparison and determining linkages and causes of said highs and lows. \n\nThe Organizational Health survey, in contrast to standard employee satisfaction surveys, can also provide qualitative data as to how employees themselves could contribute to making the organization more efficient and improving cooperation; all the while bringing out the key elements for developing the managerial and organizational culture of their company.       \n\nAll in all, we at Tripod strongly believe, that conducting an organization-wide survey one year and a survey focusing solely on the effects of follow-up actions, it is possible to achieve, in a much more efficient way, a thorough overview of the organization’s development than frequent conduction of pulse surveys permits. \n\nSuch an approach provides comprehensive information for managing employees’ engagement from a more systematic, wider and an informed point of view.", "pred_label": "__label__1", "pred_score_pos": 0.9793153405189514} {"content": "Question: Is It Difficult To Get Tourist Visa For USA?\n\nHow can I get tourist visa for USA?\n\nHow to get Visitor Visa for USA.\n\nGetting a visitor visa to USA is subject to approval.\n\n\nHow many times visa can be rejected?\n\n\nDoes US tourist visa get rejected?\n\nIf a consular officer finds you are not eligible to receive a visa under U.S. law, your visa application will be denied (refused), and you will be provided a reason for the denial. There are many reasons a visa applicant could be found ineligible for a visa.\n\nHow can I increase my chances of getting a US tourist visa?\n\nU.S. Tourist Visa: How to Make your Chances of Approval HigherEmployment. Having a job in your home country will not guarantee to have your visa issued. … Family Obligation. … Property and Personal Asset. … Community Involvement. … Travel History.\n\nCan I get a 10 year visa for USA?\n\n\nDo I need invitation letter for US tourist visa?\n\n\nWhat questions are asked in a US visa interview?\n\nThe commonly asked questions for US Visitor visa interview are the following:What is the purpose of your visit to the US? … Have you been to the US before? … Do you have relatives or friends currently in the US? … Details on your friends / relatives in the US. … Where will you be residing in the United States?More items…•\n\nCan I apply for a US visa?\n\n\nWhat is the easiest visa to get for USA?\n\nvisitor visaFor many, a “B” visitor visa is the easiest and most appropriate one to get. (See 8 U.S. Code § 1101.) The B visa a nonimmigrant visa for persons desiring to enter the United States temporarily for business (B-1) or for pleasure or medical treatment (B-2).\n\nIs it easy to get tourist visa for USA?\n\n\nHow long does it take to get a US tourist visa?\n\n\nCan we apply for US visa immediately after rejection?\n\n\nIs it difficult to get b1 b2 visa?\n\n\nHow much does it cost to get a tourist visa to USA?\n\n\nCan I get a US tourist visa if I am unemployed?\n\n1 Answer. It is not mandatory to have a job to apply for a US visa. Meets the requirements of the visa type for which they are applying, and/or that planned activities in the U.S. are allowed by that category. Being single and unemployed will not help you convince the officer of these things.\n\nHow much bank balance is required for US tourist visa?\n\n\nWhy tourist visa gets rejected?\n\nA reason for a visa refusal could be presenting a passport that is not kept in a good condition. Such case can be when passport pages are detaching or missing, when the cover of the passport is damaged and so on.\n\nIs France Visa easy to get?\n\nThe process of getting a French Visa is not easy, nor quick. You can complete the application process for a France visa by following the steps listed below: Choose the right Embassy. Compile the documents file.", "pred_label": "__label__1", "pred_score_pos": 0.9973724484443665} {"content": "Importance of Repair Records for Lemon Law Claims\n\nImportance of Repair Records for Lemon Law Claims\n\nHave you bought a new or used vehicle recently and found it to give you countless problems that require you to spend time and money taking it for repairs? If so, you might need to consider filing a lemon law claim against the auto manufacturer.\n\nShould you discover your car is a lemon, it’s vital to keep all repair receipts and records concerning the vehicle, as the burden will be on you to prove your vehicle’s faults lie with the manufacturer. For most people, hiring a lemon law attorney during this claims process is hugely beneficial and can make the process easier.\n\nWhat Exactly Is Lemon Law?\n\nLemon laws were created to protect citizens against auto fraud and ensure auto manufacturers honor the various warranties tied to their products. Under lemon law, most auto manufacturers are required to either reimburse a consumer or replace the consumer’s product if it’s found to be defective through no fault of the consumer.\n\nThe following criteria apply to lemon law and can help you determine if you have a valid claim:\n\n● Your vehicle has a factory defect that impedes its functionality, safety, and value.\n● Your vehicle has been out of commission and undergoing repairs for more than the allocated number of recommended days.\n● You have repeatedly taken your vehicle to an authorized repair center, and they have been unable to repair the recurring issue each time you have taken it to the facility.\n\nThe lemon law in California is also known as the Song-Beverly Consumer Warranty Act. This law provides additional benefits to consumers called the lemon law presumption. The lemon law presumption allows for the legal assumption that a vehicle is a lemon if a select set of criteria applies.\n\nWhy Are Repair Records Important For Lemon Law Claims?\n\nRepair receipts and records are crucial if you hope to win a lemon law claim. Without them, you might not have adequate proof of the attempted repairs. With repair receipts, you will be able to prove that a dealer was unable to repair the reoccurring issue repeatedly. Ultimately with clear, concise, and accurate receipt records from a car dealer, you will have a more substantial likelihood of winning a lemon law case.\n\nWhat You Should See On Your Repair Record\n\nBelow sets out what you should specifically look for on your repair record receipts. Should you have partial or incorrect information on the repair receipts, it will be much harder to make a claim.\n\n● There should be a generalized description of the presumed reason for you taking the car to the repair center.\n● A date should be written clearly and be the actual date you took the car to be repaired.\n● A complete list of all the parts that the dealer replaced when repairing the vehicle.\n● A notarized odometer reading from the day the vehicle was repaired.\n● The description of the labor performed on the vehicle.\n● A written date of when the vehicle was returned to the owner.\n● There also needs to be a written identification and description of the defect or condition that the dealer found.\n\nIf a consumer keeps a complete record of all repair receipts and other valid documentation, their lemon law claims process can run much more smoothly. By not having legitimate records, a consumer’s claim will be more challenging and potentially deemed not legitimate.", "pred_label": "__label__1", "pred_score_pos": 0.6701273918151855} {"content": "Oriental Tea Set\n\nby Plan Toys\n\nPlan Toys\nOnly 4 left, usually dispatched same day\nOut of Stock\n\n\nPretend Play\nIt's afternoon tea time! Compatible with other kitchen toys, the Classic Tea Set includes a teapot with 2 tea cups, pitcher, tray for serving and caddy spoon.\n\nSupports Development\nPretend play is the perfect way to stimulate a child's imagination while also inviting them to practice their social and communication skills. Little ones improve their vocabulary as they sit and enjoy tea with another person. Additionally, the Classic Tea Set stimulates fine motor skills and hand-eye coordination as little hands hold the pieces stead while pouring, serving and tasting. Suitable for children 3 years and older.\n\n\n • Weight: 0.58 kg.\n • Dimension: 17 * 5 * 1.3 cm\n • Brand\n\n", "pred_label": "__label__1", "pred_score_pos": 0.6160482168197632} {"content": "Name: in a bid to flush out rent-controlled\n\n\nName: Yao Liu\n\nCourse: Econ 4597.01\n\nBest services for writing your paper according to Trustpilot\n\nPremium Partner\nFrom $18.00 per page\n4,8 / 5\nWriters Experience\nRecommended Service\nFrom $13.90 per page\n4,6 / 5\nWriters Experience\nFrom $20.00 per page\n4,5 / 5\nWriters Experience\n\n\nFirst Homework Assignment\n\neconomy comprises the exchange of goods and services that are not officially\nrecognized by the government. Therefore, these operations are not subject to\ntaxation. Although dealings in this economy include income from citizens in\nself-employment, most underground economy transactions involve shadowy\nprocedures in contraband and other illegal substances. Formal corporate players\nmay also engage in unsanctioned businesses, for example with the intention of\nevading government control. The controversies regarding rent regulation in the\nUnited States’ real estate market has triggered fears of the deliberate\ninvolvement of landlords in the underground economy. In this connection,\nseveral suspicious fires have destroyed buildings in rent-regulated neighborhoods,\nraising concerns among stakeholders in government and insurance companies\nregarding their cause.\n\ninferno that ravaged several buildings in the Mission District area of San\nFrancisco created fears of the impact of rent-regulation by the government in\ncertain jurisdictions. The landlords received the blame for deliberately\nburning the property in a bid to flush out rent-controlled tenants and resell\nthe building for high profits. Moreover, state governments have engaged in\nseveral conflicts with landlords over rent-regulation. It is the duty of the\ngovernment to provide housing to all the citizens (Brady 15). However, the enormity of this task constrains the\nstate to partner with the private sector in meeting this basic need. In a bid\nto provide affordable housing, several states have a rent-regulation rule that\ncushions citizens from exploitation by landlords. For instance, the Condominium\nConversion Statute of 1983 protects specific categories of tenants from\nreckless eviction by landlords. The statute provides that landlords must issue\nan eviction notice lasting at least a year for their tenants. The eviction\nnotice period is longer for the handicapped, the elderly, and tenants in the\nlow-income bracket (“The Massachusetts Condominium Conversion Statute, Chapter\n527 of the Acts of 1983” 1). Landlords find these government strictures\nunfriendly to their business projections and may resort to illegal actions to\nforce the tenants out of the premises.\n\nwars in Massachusetts have pitted tenants against landlords since 1971. Renters\nstaged demonstrations and succeeded in influencing the City Hall to enact rent\ncontrol laws. However, the landlords overturned this provision through lobbying\nand abolishing rent control through a statewide ballot (“The Massachusetts\nCondominium Conversion Statute, Chapter 527 of the Acts of 1983” 1). The rent\nwars dominated the state politics for over twenty-five years as opposing camps\nstruggled to elect their sympathizers in political office (Brady 15). The current arson scenarios\nexperienced in several states imply underhand dealings among property owners.\n\nRent regulations deny landlords the liberty to charge market rates for their\nhouses, which leads to diminished profit margins. Homeowners have previously\nused political processes to influence de-regulation, but most of these efforts\nhave failed to overcome the political pressure to provide affordable housing\nfor citizens.\n\nincreasing fires in low-cost housing neighborhoods are attributed to the\nschemes of landlords to indirectly evict tenants and re-sell their houses for\nhigh prices. Insurance companies also have a role to play in the fires; when\nthe houses burn, the landlords place a claim for compensation from these\ncompanies (Brady 15). Most of the houses\nthat experience fires are old buildings where the landlords are compelled by\nthe government regulations to charge limited rents against their wish.\n\nunderground economy in the housing sector thrives because of the pricing\nconflict between the government and private entrepreneurs. Whereas the former\nis driven by the service provision goal for the welfare of its citizens,\nprivate homeowners engage in this sector to make profits. The government must\nprotect the citizens against the exploitation by profit-hungry landlords and\nalso consider the profitability of the homeowner. The government can regulate\nrents for the citizens by completely considering investing in the housing\nbusiness. In this regard, the state can charge minimal rents as a service to\nthe citizens. However, most state governments do not have the capacity to fully\nprovide housing, and for this reason, the private segment is a critical partner\nin this sector. Therefore, the government must engage in consultation with\nprivate players in the housing sector to achieve reasonable rental income\n\nWorks Cited\n\nMassachusetts Condominium Conversion Statute, Chapter 527 of the Acts of 1983”. New England Real Estate Journal, 25 May,\n\nBrady, James. “Arson,\nUrban Economy, and Organized Crime: The Case of Boston.” Social\nProblems. vol. 31, no.1, 1983, pp. 1-27.", "pred_label": "__label__1", "pred_score_pos": 0.5016460418701172} {"content": "Shabeeran's Road to Recovery | The Indus Hospital Korangi Campus\n\nShabeeran’s Road to Recovery\n\nShabeeran can’t imagine that a small accident could make her literally disabled. In her surroundings, people have fallen from motor bikes but they never had such major injuries. She sometimes wonder why it happened!\n\nIt was a bright sunny day of June. 24-year-old Shabeeran had an invitation for a function from her maternal side. Nasim Ali, her husband, was going to drop her at her relative’s place. He was riding the motor bike and Shabeeran was sitting behind him.\n\nNasim is an experienced motor bike driver and has never had any serious accidents. But that was an exceptional day. The bumpy road and chaotic traffic made his bike skid and he with Shbeeran fell on the under-construction road. Luckily Nasim remained safe but Shabeeran got badly injured. Her hip was badly hurt and she realized that she could not stand.\n\nNasim took her to Naushehro’s hospital where they found that her hip joint dislocated. They came home and Bandhwa/ Kumbhar (a local healer who ties bones and joints to realign them). After 40 days, he removed the bandage but Shabeeran was not yet able to walk. The healer again wrapped the bandage.\n\nNasim took Shabeeran to another Bandhwa. Before that they got an X-Ray done. The second healer checked the X-Ray and told them that her joint has wrongly aligned and now they should go to the hospital.\n\nThis time Nasim took her to a private clinic at Nawabshah where the doctor suggested him to go to the Indus Hospital, Karachi as Nasim could not afford the surgery. November 2, 2017 they reached the Indus Hospital. Shabeeran’s situation was so severe that the management bypassed all protocols and admitted her and the next day she was operated.\n\nShabeeran and her husband are so happy that after four-month long struggle and distress they finally found a hospital which didn’t charge a single rupee. The quick turnaround time and best post-operative care was a dream come true for them.", "pred_label": "__label__1", "pred_score_pos": 0.5685206055641174} {"content": "Mental Health, PTSD\n\nCPTSD: 9 Therapy Approaches to Heal Childhood Trauma\n\nUnresolved childhood trauma has significant impact on mental and emotional health.\n\nChildhood traumas can be the result of issues ranging from extreme violence and neglect to experiencing feelings of not belonging or being unwanted.\n\nFacing such situation pushes you to learn to compensate by developing defenses around your most vulnerable parts.\n\nYou might oscillate between feelings of anger or fear and shame or despair.\n\nYou might suffer from chronic anxiety or depression and other issues, such as self-criticism, emotional suffering, and relationship difficulties.\n\nYou might even experience chronic pain.\n\nThis article will help you understand your childhood trauma and discover therapy approaches that will help you heal your unresolved trauma.\n\nReady? Let’s begin!\n\nCPTSD: 9 Therapy Approaches to Heal Childhood Trauma\n\nUnderstanding Childhood Trauma\n\nCPTSD: 9 Therapy Approaches to Heal Childhood Trauma\n\nPost-traumatic stress disorder (PTSD) is often associated with traumatic events such as car accidents, natural disasters, or acts of violence and sexual abuse.\n\nPTSD refers to the presence of symptoms, such as powerful emotions of fear or shame, well after the event is over.\n\nChildhood trauma can cause complex post-traumatic stress disorder (C-PTSD): a form of PTSD that occurs as a result of long-term exposure to traumatic stress during childhood, rather than in response to a single event.\n\nC-PTSD is also referred to as developmental trauma disorder (DTD).\n\nDespite its significant impact on emotional and mental health, C-PTSD is not included in the DSM-5 (Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition) used by clinicians, and is considered instead as PTSD given that they share more than 90 percent of the symptoms.\n\nC-PTSD is a learned stress disorder that can be replaced by a positive mind-set and health-promoting behaviors.\n\nWhat Causes Complex PTSD?\n\nComplex PTSD is the result of pain and stress experienced during childhood.\n\nC-PTSD can be caused by the following types of experiences:\n\n* Childhood relationships with parents or caregivers that are frightening and/or unpredictable\n\n* Ongoing or repeated experiences of neglect or physical, verbal, or even sexual abuse or exposure to domestic violence\n\n* Being raised by a parent or caregiver who has an untreated mental illness or an active addiction\n\n* Facing severe social stress caused by bullying or exposure to traumatic events without being supported by a caregiver\n\nSymptoms of C-PTSD\n\nThe ramifications of C-PTSD, whether cognitive, emotional, or physical, can persist into adulthood manifesting in the following:\n\n1. Cognitive distortions: Inaccurate beliefs about yourself, others, and the world.\n\n2. Emotional distress: Frequent feelings of anxiety, helplessness, hopelessness, deep loneliness, shame, unfairness, and depression often triggered by social loss and abandonment.\n\n3. Disturbing somatic sensations: Uncomfortable body sensations, in which psychological distress manifests in the form of physical symptoms.\n\n4. Disorientation: Loss of distinction between the past and the present.\n\n5. Avoidance: Shutting out or pushing away uncomfortable memories, or emotions through denial, dissociation, or addictive behaviors.\n\nOther symptoms might include self-harm, emotional eating or eating disorders, impulsivity or recklessness, excessive risk-taking and promiscuity, etc.\n\nC-PTSD symptoms might look like other disorders.\n\nA child who has been abused or neglected might appear impulsive, anxious, angry, and/or depressed, which can lead to inaccurate diagnoses of bipolar disorder, borderline personality disorder, anxiety disorder, attention deficit hyperactivity disorder (ADHD), body image problems (such as body dysmorphic disorder) or major depressive disorder.\n\nAttachment Theory And C-PTSD\n\nCPTSD: 9 Therapy Approaches to Heal Childhood Trauma\n\nAttachment theory refers to the way young children respond when they’re separated from their primary caregiver.\n\nSecure attachment develops when we can depend on a safe, predictable, and loving caregiver during early childhood.\n\nThat doesn’t mean that parenting needs to be “perfect”.\n\nParents will inevitably misattune to their children on occasions, but these mistakes are essential in providing healthy opportunities for the child to learn that ruptures in connection can be repaired.\n\nThe child learns emotion regulation and stress tolerance, and develops healthy boundaries.\n\nHowever, neglect and abuse that accompany complex PTSD forms insecure attachment styles:\n\nInsecure ambivalent:\n\nThe insecure ambivalent child was raised by an inconsistent primary caregiver who is at times highly responsive but at other times is intrusive and invasive.\n\nBecause the child cannot depend upon the caregiver for predictable connection, he consequently feels overly dependent and suffers from abandonment anxiety.\n\nInsecure avoidant:\n\nThe insecure avoidant child was raised by a distant or disengaged caregiver who is emotionally unavailable and/or rejecting.\n\nThis child adapts by disconnecting emotionally, avoiding closeness and becoming overly self-reliant.\n\nAs an adult, he tend to be dismissive of their own and other people’s emotions and find it hard to enjoy a deeper, more intimate connection.\n\n\nThis child was raised by a caregiver whose behavior is chaotic, and/or abusive.\n\nThis creates a sense of alarm and confusion, which makes the child paradoxically seek closeness from the very source of the terror that they are trying to escape.\n\nThis is often referred to as “fright without solution.”\n\nAs an adult, he tends to act in an impulsive or aggressive way to manage uncomfortable emotions. Relationships interactions can mimic the abuse they experienced with caregivers, so they either act abusive themselves or choose abusive partners.\n\nC-PTSD is associated with unsecure attachment styles.\n\nHow To Treat Complex PTSD?\n\nCPTSD: 9 Therapy Approaches to Heal Childhood Trauma\n\nThere’s no single therapy approach that works best for healing C-PTSD. A combination of psychotherapies are used by therapists, including CBT, DBT, EMDR therapy, and somatic (body-centered) psychotherapy\n\n1. Cognitive Behavioral Therapy (CBT)\n\nCognitive behavioral therapy (CBT) is considered one of the most effective types of counseling for PTSD.\n\nCBT helps you recognize the relationships between your thoughts, emotions, and behaviors and assists you in replacing distorted or distressing thoughts with more accurate and positive beliefs.\n\nThere are two forms of CBT that are frequently applied to treat PTSD: exposure therapy and cognitive processing therapy.\n\nExposure Therapy\n\nExposure therapy helps you desensitize yourself to the trauma by repeatedly talking about your traumatic memories until you feel less overwhelmed by them.\n\nThis method also uses relaxation methods and breathing exercises to help you calm down your mind and body, while exposing yourself to your traumatic memories.\n\nCognitive Processing Therapy (CPT)\n\nCognitive processing therapy (CPT) helps you correct any cognitive distortions around your traumatic memories and guides you to incorporate new, more accurate beliefs.\n\nFor example, if you believe that the abuse you experienced as a child was your own fault, you can challenge that belief by recognizing that you were just a child – you couldn’t have done anything wrong.\n\nPractical Exercise 1 – Exploring Your Inaccurate Beliefs\n\nIn your journal, write down negative beliefs attached to your childhood trauma. Common negative beliefs might include:\n\n • I am unlovable\n • I am unworthy\n • I do not deserve to exist\n • I am helpless or powerless\n • I cannot trust anyone\n\nChallenge these beliefs by recognizing that as a child you couldn’t have done anything wrong.\n\nWork with a therapist on challenging any beliefs you find hard to change.\n\nReplace negative beliefs with positive ones:\n\n • I am lovable\n • I am worthy\n • I deserve to exist\n • I am strong\n • It is safe to love and trust now\n\n2. Dialectical Behavior Therapy (DBT)\n\nDBT, originally developed as a specific type of CBT for the treatment of borderline personality disorder, has been found particularly beneficial for C-PTSD.\n\nThe term dialectical refers to a synthesis of opposites.\n\nThe primary dialectic within DBT is the polarity between acceptance and change – it’s only when you accept who you are that you can change and grow.\n\nDBT therapy focuses on the development of mindfulness, distress tolerance and emotion regulation, and interpersonal effectiveness.\n\n\nWithin the context of DBT, mindfulness focuses on developing your capacity to observe your own mind while cultivating acceptance.\n\nThis acceptance helps you recognize that you don’t need to escape or suppress uncomfortable experiences and thoughts.\n\nEmotion Regulation\n\nDBT emotion regulation skills help you reduce suffering related to ineffective reactions to your emotions, rather than escaping them.\n\nEmotion regulation encourages you to reflect on your thoughts and emotions before jumping to reactions or behaviors.\n\nDistress Tolerance\n\nDBT distress tolerance skills help you handle painful emotions in a healthy way without needing to resist or changing them.\n\nInterpersonal Effectiveness\n\nDBT interpersonal effectiveness skills emphasize assertiveness, boundaries, and coping with conflict.\n\nIt encourages you to address conflicts gently by refraining from put-downs or name-calling, respecting yourself and others, apologizing when you have done something wrong, and being truthful.\n\nPractical Exercise 2 – Radical Self-Acceptance\n\nThe following exercises will facilitate self-acceptance:\n\nBreath Awareness\n\nAccepting reality involves anchoring your mind in the sensations of your body, observing your breath is one way to help you do that.\n\nStart noticing the subtle sensations of your breath coming in and out of your nose and the rise and fall of your belly.\n\nYou can practice breath awareness while sitting or walking.\n\nOnce you feel comfortable, start engaging your breath practice to help you deal with difficult feelings and calm yourself down.\n\n\nPracticing a half-smile can help you change your mental state and cultivate a serene feeling in the moment.\n\nStart by relaxing your face and slightly turning up your lips.\n\nYou can start practicing the half-smile while you’re feeling calm, and eventually engage the practice while reflecting on a difficult event.\n\nBody Acceptance\n\nSometimes feeling the body can stir up uncomfortable sensations, emotions, or memories. Explore the concept of loving and accepting the pain. However, if this practice ever becomes too difficult, know that you can also pace yourself by sensing a body part and then bringing your awareness back out to your external environment.\n\nDoing a body scan with the intention of accepting every sensation in your body will help you with radical acceptance:\n\n* Sit in a comfortable and take a moment to tune into each area of your body, increasing your awareness of your sensations and the experience.\n\n* Focus on your breath and relax every part of your body.\n\n* Bring acceptance and love to each part of your body by imagining rays of love permeating your body going through your feet, your legs, your pelvis, your belly, your back, your chest, your arms, your hands, your shoulders, your throat, and your head.\n\nYou can place your hands over each part of your body.\n\nPositive Self-Statements\n\nTo further develop deep appreciation for yourself, use positive self-statements.\n\nTry saying, “I love myself just as I am in this moment.”\n\nYou can get more specific and extend this acceptance toward your defenses and vulnerable emotions by saying “I love myself even though … I hurt myself sometimes, I push people away,” and, “I love myself even when I am … ashamed, sad, afraid.”\n\n3. EMDR Therapy\n\nCPTSD: 9 Therapy Approaches to Heal Childhood Trauma\n\nEye movement desensitization and reprocessing (EMDR) therapy is a therapy approach developed by Dr. Francine Shapiro.\n\nEMDR therapy helps you identify triggering memories, emotions, beliefs, and sensations and process traumatic events.\n\nThe desensitization phase helps you remain aware of your present moment while simultaneously recalling memories of the traumatic event.\n\nDual attention is amplified using stimulation in the form of eye movements, tapping, or tones that alternate between the left and right side of your body.\n\nDuring the reprocessing phase, traumatic memories are processed along with the negative beliefs associated with them and later replaced with positive beliefs.\n\n4. Somatic Psychotherapy\n\nSomatic psychotherapy is a set of therapy approaches that focus on the body rather than the mind.\n\nReasoning and logic alone might not be sufficient to treat trauma. Traumatic events not only lead to negative beliefs, but also to physiological changes, such as tension and rapid heart rate.\n\nThey help you engage body awareness to release the psychological and physiological impact of traumatic events.\n\nPractical Exercise 3 – developing somatic awareness\n\nThe following exercise will help you cultivate awareness of your body without judgment:\n\n* Sit in a comfortable position and take a moment to tune into each area of your body.\n\n* Bring your attention to your breath. Notice any areas of tension, heaviness, or constriction.\n\n* Next, Bring your attention to your feet, legs, and pelvis. Notice the sensations in your muscles and on your skin.\n\n* Take a deep breath as you bring your attention into your torso. Notice any sensations across your abdomen, lower back, chest or upper back.\n\n* Bring your attention to your shoulders, arms, and hands. Notice any areas of tension or relaxation.\n\n* Last, bring your attention to your neck, throat, and face. Notice the general sensations of your head.\n\n* Now, take a final moment to notice your body as a whole.\n\n* In your journal, write down your notes about your experience.\n\nThis awareness exercise helps you deepen your curiosity about your sensations, relax and release holding.\n\nOther Therapy Approaches\n\n5. Vagus Nerve Stimulation\n\nCPTSD: 9 Therapy Approaches to Heal Childhood Trauma\n\nMind-body therapies work by regulating your autonomic nervous system (ANS).\n\nYour ANS consists of sympathetic and parasympathetic nervous system states.\n\nThe vagus nerve plays a central role in ANS regulation because it connects your brain to your digestive system, heart, lungs, throat, and facial muscles.\n\nVagus nerve stimulation helps you calm down when anxious and feel nurtured by your capacity to rest and feel nourished, by keeping your digestive system functioning optimally and your immune system in check.\n\nYour vagus nerve passes through your belly, diaphragm, lungs, throat, inner ear, and facial muscles. Therefore, stimulating your vagus nerve is done through stimulating these areas of your body.\n\nPractical Exercise 4 – Stimulating Your Vagus Nerve\n\nThe following strategies will help you stimulate your vagus nerve from the comfort of your home:\n\n\nBecause the vagus nerve passes by the vocal cords and the inner ear, vibrations of humming help soothe your nervous system.\n\nChoose your favorite tune and notice the sensations in your chest, throat, and head.\n\nConscious breathing:\n\nSlow, conscious breathing is one of the fastest techniques to soothe your nervous system.\n\nVagus nerve stimulation happens when the breath is slowed down from the typical 10 to 14 breaths per minute to 5 to 7 breaths per minute.\n\nDiving reflex:\n\nThis is one of the best vagus nerve stimulation techniques.\n\nThe diving reflex slows the heart rate, increases blood flow to the brain, which reduces anxiety, and relaxes the body.\n\nTo stimulate the diving reflex, splash cold water on your face from your lips to your scalp line.\n\n6. Working With Parts\n\n“Parts work” is an approach to healing that recognizes that you develop different parts of yourself to hold unwanted or unacceptable feelings and memories.\n\nParts can reflect younger developmental phases of your life, such as the wounded child or a rebellious teenager, and it can also represent an internalization from your family of origin, such as the critical parent from childhood as your inner critic.\n\nInternal Family Systems (IFS) therapy, developed by Dr. Richard Schwartz identifies three kinds of parts:\n\nExiles: Exiles are the parts of yourself that you cut off from conscious awareness in an attempt to distance yourself from painful memories and emotions, such as rage, shame, fear, loneliness, or grief. Often these parts reflect the wounded child\n\nManagers: Managers are the overly rigid and self-critical parts of yourself that attempt to protect you from vulnerable feelings by staying in control.\n\nFirefighters: Firefighters work on repressing exiles as they attempt to emerge. To do that these parts use substances, self-harm, or dissociation to distract you from your underlying emotional pain.\n\nThe goal of IFS therapy is to develop your relationship to the Self – your own source of wisdom or inner knowing.\n\nWhen you’re living from this center, you are able to regulate the other parts of you and feel calm, confident, and compassionate.\n\n7. Positive Psychology And Resilience\n\nCPTSD: 9 Therapy Approaches to Heal Childhood Trauma\n\nPositive psychology focuses on strengths rather than deficits. It recognizes your ability to be resilient despite your traumatic history.\n\nResilience is a set of strategies that are learned and practiced. These strategies include:\n\n* Cultivating a growth mind-set that helps you use positive and negative life events to grow as an individual\n\n* Staying connected to your community\n\n* Working through difficult emotions\n\n* Taking responsibility of your life and believing that you have the capacity to shape the course of your life\n\n* Supporting your physical health through exercise, proper diet, and good sleep quality\n\n* Expressing yourself through journaling and creativity\n\n8. Relaxation Techniques\n\nSome of the most common and well-researched relaxation techniques include progressive muscle relaxation (PMR), visualization, and diaphragmatic breathing.\n\nThese practices focus on calming down your body.\n\nIn PMR, you sequentially tense and relax muscle groups throughout your entire body (e.g., arms, legs, torso, neck).\n\nVisualization involves recalling memories of times when you felt relaxed, which helps your body respond accordingly and relax.\n\nSlow and rhythmic diaphragmatic breathing, or “belly breathing,” helps calm you down if your body, especially when it is in a fight-or-flight state.\n\n9. Therapeutic Yoga\n\nTherapeutic yoga helps you explore physical postures within a context of mindfulness, conscious breathing, and somatic (body) awareness.\n\nTherapeutic yoga focuses less on the outer look of a pose and more on supplying yourself with an environment that feels emotionally and physically safe, minimizing the use of mirrors, and setting a tone of self-compassion.\n\nAssuming standing postures such as warrior pose or downward dog helps you explore strength-building.\n\nRestorative postures such as child’s pose help you practice the art of surrender and letting go.\n\nWhat’s Next? How to Heal From Childhood Trauma and Transform Pain into Purpose\n\n\nPTSD Guide: How to Heal Emotional and Psychological Trauma?\n\nPost-traumatic stress disorder (PTSD): How to Heal Your Trauma?\n\nYour turn…\n\n\n\nCPTSD: 9 Therapy Approaches to Heal Childhood Trauma\n\n\n • Portions of this article were adapted from the book The Complex PTSD Workbook, © 2017 by Arielle Schwartz. All rights reserved.\n\nLeave a Reply\n", "pred_label": "__label__1", "pred_score_pos": 0.9171979427337646} {"content": "What Is The Longest Distance An Arrow Has Been Shot?\n\nHow far can a Longbow fire an arrow?\n\nModern longbows have a useful range up to 180 m (200 yd).\n\nA 667 N (150 lbf) Mary Rose replica longbow was able to shoot a 53.6 g (1.9 oz) arrow 328 m (360 yd) and a 95.9 g (3.3 oz) a distance of 249.9 m (272 yd).\n\nA flight arrow of a professional archer of Edward III’s time would reach 400 yds..\n\nHow many arrows can a Longbow fire in a minute?\n\nten arrowsThese experts believe that the longbow drew anywhere from 80 to 110 pounds of pressure. However, these powerful weapons were effective as far as 180 to 200 yards. The longbow was considered a formidable weapon when used correctly. A skilled archer could shoot six to ten arrows in a minute with accuracy.\n\nCan a person catch an arrow?\n\nArrows can be caught. … Lars Andersen, a youtuber, has successfully done it, although I suspect that the arrow shot at him came from a half-draw, low-weight bow. The mythbusters studied it and the myth that you can catch an arrow got fully busted. The conditions they used were at full draw and a moderately heavy bow.\n\nHow far can an arrow be shot?\n\n\nIs an arrow as deadly as a bullet?\n\n\nHow many arrows were fired at Agincourt?\n\nAt the battle of Agincourt in 1415, 1,000 arrows were fired every second.\n\nWould an arrow kill you?\n\nThat’s not to downplay arrows, because arrows are very lethal too. Our ancestors hunted and killed big game, much larger than humans, with arrows. Just don’t expect them to kill quickly unless you pierce the heart or brain. … An arrow hit in any major organ or blood vessel will kill the victim, but not immediately.\n\nWhy are arrows so deadly?\n\nWith modern target arrows if you are lucky it’s just a day in hospital. The lethal zone is just the heart and aorta, crippling is widder brain eyes spine. Problems starts with exploded carbon arrows, where you must remove the bits of carbon fiber to prevent infection. As to render unable to fight , pretty effective.\n\nWill 50 lb bow kill deer?\n\n\nCan a human dodge an arrow?\n\nConsidering that people catch arrows – 10 catches in 2 minutes, it is clearly possible to dodge arrows. Watch the video and you can see that dodging is definitely possible.\n\nHow much does an arrow drop at 100 yards?\n\nAt 100 yards the total drop from the zeroed in pin has now been reduced to around 90″ for the fastest arrow and 185″ for the slowest.\n\nWhat is the fastest arrow ever shot?\n\nThe fastest time to shoot 10 arrows into a 40 cm target from an 18 m distance is 1 min 0.03 sec, and was achieved by Joseph McGrail-Bateup (Australia) in Canberra, Australian Capital Territory, Australia, on 17 November 2019. Joseph used a longbow for his attempt.\n\nWhat is the farthest flight in feet of an arrow shot with someone’s feet?\n\nThe farthest arrow shot using the feet is 12.31 m (40 ft 4.64 in) and was achieved by Brittany Walsh (USA) at Creston School in Portland, Oregon, USA, on 31 March 2018.\n\nIs a bullet faster than an arrow?\n\nArrows are much slower than bullets. An arrow’s speed depends on the capability of the archer and the bow itself, but the average speed of arrows is in the realm of ~80–100 m/s. However, the SLOWEST bullet out there is still about 2 times faster.\n\nWould Kevlar stop an arrow?\n\nKevlar doesn’t protect against pointed impact weapons like knives and arrows. This is because Kevlar is actually a synthetic fiber that and a bullet-proof vest is made up of several layers of Kevlar and plating. … the armor is worthless if there is no ceramic plate that stops the penetrative force of the arrow/blade.\n\nHow accurate is a longbow?\n\nArchers would be trained to shoot at groups of enemy and not individuals, at least not at any great range. The English/Welsh Longbow of the early 15th century, had a range of up to 350 yds or so, but it was only considered effective at up to around 200 yds. This doesn’t take into account armour worn by the enemy.\n\nCan an arrow pierce a skull?\n\nSo, yes, an arrow can kill. The right bow, arrow and broadhead could penetrate the skull and kill a person instantly. Generally the perfect shot with a bow is one that penetrates both lungs and/or heart. … If one arrow pierces the heart or a major artery, one could quickly bleed out, but it would not be instant.\n\nWhat hurts more bullet or arrow?\n", "pred_label": "__label__1", "pred_score_pos": 0.7382636070251465} {"content": "Who is the depositary bank for Opthea’s ADRs?\n\nBNY Mellon is the depositary bank and plays a key role in the process of issuance and cancellation of ADRs. For more information please visit https://www.adrbnymellon.com.\n\nWhat is an American Depositary Receipt (ADR)?\n\nDepositary receipts (DRs) are negotiable U.S. securities issued by a U.S. bank, referred to as a “depositary bank,” that typically represent a non-U.S. company’s equity. DRs trade freely in global markets and can be listed on major stock exchanges including NASDAQ.\n\nDRs facilitate cross-border trading and may help non-U.S. companies raise capital in global equity offerings or be used as acquisition currency for mergers and acquisitions. DRs allow non-U.S. companies to make their shares available outside their home markets and allow investors in the U.S. and elsewhere to easily invest in companies on a more global basis.\n\nFor more information please visit https://www.adrbnymellon.com/resources/dr-basics.\n\nWhat is an ADR ratio?\n\nAn ADR Ratio provides the number of underlying shares represented by one ADS. 1 Opthea ADR represent 8 ordinary shares on the Australian Securities Exchange (ASX).\n\nWhat is the difference between an ADR and an ADS?\n\nAn ADR is a negotiable certificate issued by a depository bank to represent a specific number of shares of a foreign company traded on a U.S. exchange. An ADS (American Depositary Share) is the share issued under the ADR agreement which is actually traded.\n\nHow can I purchase Opthea ADRs?\n\nOpthea ADRs can be purchased through a typical broker, just as you would to buy U.S. securities. You cannot buy ADRs directly from Opthea.\n\nHow do I convert my shares into ADRs?\n\nConverting ordinary shares into ADRs can be done through an investment advisor or broker. Contact BNY Mellon for additional assistance.\n\nWhere are Opthea’s ADRs traded and under what ticker?\n\nOpthea’s ADRs are traded in the US on the NASDAQ Market under the ticker OPT.\n\n\n\n\nFor registered owners, ownership is registered by the depositary bank and is evidence by an account statement provided by the depositary.\n\nRegistered owners can hold physical ADR certificates, please contact BNY Mellon for more information. All registered holders, be it in book entry form or certificated, receive dividends and proxy voting materials directly from BNY Mellon.\n\nHow are dividends paid and taxed?\n\nDividends on an ADR are paid in U.S. dollars and are generally taxable, similar to dividends on U.S. shares.\n\nWhat financial information is available to United States investors?\n\nOpthea files annual, semi-annual, and special reports alongside other information with the Securities and Exchange Commission (SEC). Please visit http://www.sec.gov to view our latest filings. You may also read and copy any documents that Opthea files with the SEC at the Public Reference Room, 100 F Street, N.E., Washington, D.C. 20549, USA or call the SEC on 1-800-SEC-0330 for further information on the Public Reference Room.\n\nWhat are the benefits of ADRs to United States investors?\n\nInvestors in the United States generally prefer to purchase ADRs rather than ordinary shares in the issuer’s home market because ADRs trade, clear and settle according to United States market conventions. One of the main advantages to ADRs is the facilitation of diversification into foreign securities. ADRs also allow easy comparison to securities of similar companies as well as access to price and trading information, U.S. dollar dividend payments and corporate action notifications.\n\nFor additional questions about ADRs please contact:\n\nBNY Mellon Shareowner Services\nP. O. Box 505000\nLouisville, KY 40233-5000\nU.S. Toll Free Telephone: 1-888-BNY-ADRS (1-888-269-2377)\nTelephone for International Callers: 1-201-680-6825\nWebsite: www.mybnymdr.com\nE-Mail: shrrelations@bnymellon.com", "pred_label": "__label__1", "pred_score_pos": 0.8817217946052551} {"content": "Thin 4000mAh power bank with a power gauge and a smart aluminium finish. The input power is 5V/1 Amp and the output power is 5V/1 Amp. It can be recharged in 5-6 hours from a USB port or a mains adapter. Comprehensive instructions and a Micro-B USB cable are included. An optional EVA carry case and a triple connector cable are available on request. Zion laser engraves to an oxidised white colour.", "pred_label": "__label__1", "pred_score_pos": 0.9978840351104736} {"content": "\n\nCookies on our website\n\n\nData from Samnordisk runtextdatabas\n\nlogin: password: stay logged in: help\n\nÓláfr hvítaskáld Þórðarson (Ólhv)\n\n13th century; volume 2; ed. Lauren Goetting;\n\nIII. 2. Fragments (Frag) - 9\n\nprose works\n\n\n\nFragments — Ólhv FragIII\n\n\nstanzas:  1   2   3   4   5   6   7   8   9 \n\n\nSkP info: III, 302\n\nold edition introduction edition manuscripts transcriptions concordance references search files\n\n\nThe following nine helmingar and couplets (Ólhv Frag 1-9) are used as illustrations of rhetorical figures in TGT. These fragments belong to the same prose and ms. context as the fragments of Anon (TGT) in this volume, and a more detailed discussion of the work, its author, mss and editions, can be found in the Introduction to Anon (TGT) in Introduction to this Volume. The stanzas in Ólhv Frag are anonymous in the treatise but are here attributed to Óláfr hvítaskáld ‘White Skald’ Þórðarson on the basis of their close resemblance to examples used in corresponding sections of related Latin grammatical treatises. Because Óláfr can be reliably identified as the author of TGT, verse examples which closely resemble the Latin are likely to be of his composition. The Notes to individual stanzas explain the correspondences with the Latin exemplars.\n\nAs with Anon (TGT), both the form and content of these fragments is diverse, including battle and victory themes (sts 3, 5, 6, 8), mythological material (sts 4, 7), love poetry (st. 1), a traditional ending to an encomium (st. 2) and an example of Christian typology (st. 9). They include material mainly in dróttkvætt (sts 1, 3, 5, 7, 8, 9), in addition to a kviðuháttr fragment (st. 2) and two fornyrðislag fragments (sts 4, 6). Finnur Jónsson (Skj) classifies the majority (sts 1-3, 5, 6, 8) as anonymous twelfth-century Vers om ubestemmelige personer og begivenheder ‘Stanzas about unidentified persons and events’; sts 7 and 9 are also placed by Finnur in the twelfth century (Vers, hentydende til sagn og lign. ‘Stanzas referring to legends and similar’ and Andre religiøse vers ‘Other religious stanzas’ respectively). Stanza 4 is unaccountably omitted from Skj.\n\nRunic data from Samnordisk runtextdatabas, Uppsala universitet, unless otherwise stated", "pred_label": "__label__1", "pred_score_pos": 0.8782228827476501} {"content": "• Casino betting online\n\n Alexander Graham Bell Telefon\n\n Reviewed by:\n On 10.02.2020\n Last modified:10.02.2020\n\n\n Deshalb legen wir bei Casino Professor bei unserer Auswahl der besten.\n\n Alexander Graham Bell Telefon\n\n Mitte des Jahrhunderts wird das Telefon gleich vierfach erfunden. Am Ende aber kassiert Alexander Graham Bell den Ruhm. Alexander Graham Bell was the first to secure a patent for the telephone, but only just. And it almost cost him his marriage Im Alter von elf Jahren beschloss. Zwei Stunden nachdem Alexander Graham Bell die Unterlagen über sein Telefon beim US-Patentamt eingereicht hatte, erklärte sein Konkurrent Elisha Gray.\n\n Erfindung des Telefons\n\n Alexander Graham Bell was the first to secure a patent for the telephone, but only just. And it almost cost him his marriage Im Alter von elf Jahren beschloss. Zwei Stunden nachdem Alexander Graham Bell die Unterlagen über sein Telefon beim US-Patentamt eingereicht hatte, erklärte sein Konkurrent Elisha Gray. Die \"Telefon-Idee\" geriet erstmal in Vergessenheit. Philipp Reis ( - ) schuf das \"Wursthaut-Telefon\" Alexander Graham Bell ( - ) Alexander.\n\n Alexander Graham Bell Telefon Navigační menu Video\n\n Alexander Graham Bell pencipta telefon\n\n In partnership with Gardiner Greene HubbardBell helped establish the publication Science during the early s. Höchster Eurojackpot mengetahui lebih lanjut Nicht Bearbeitet sejarah telefon? Vibration of the diaphragm caused a needle to vibrate in the water, varying the electrical resistance in the circuit.\n\n Roulette mit geld Paddy Kelly Sing Mein Song die Bonusbedingungen sind allerdings weniger Paddy Kelly Sing Mein Song gestaltet. - Navigationsmenü\n\n Ein Beamter beschuldigte sich selbst der Bestechung, jedoch wurde seine anscheinend wankelmütige Aussage auch in der internationalen Fachpresse bezweifelt. Gray und der mit Mma Kämpfe verbündeten Western Electric Company gelang es dabei nicht, ihre Ansprüche gegen Bell durchzusetzen. Meucci wollte seinen Apparat zum Patent anmelden, aber aus finanziellen Gründen konnte er sich von bis nur ein Vorpatent leisten. Das Telefon ist die Maestro Kartenprüfnummer Erfindung aller Zeiten. Alexander Graham Bell, ameriški znanstvenik, izumitelj, inženir in inovator, * 3. marec , Edinburgh, Škotska, Združeno kraljestvo, † 2. avgust , Beinn Bhreagh, Nova Škotska, Kanada.. Bell, najbolj znan po izumu telefona, je bil pogosto tudi imenovan oče stoopdice.com oče, ded in brat so se ukvarjali z govorom, njegova žena in mati sta bili stoopdice.comzba: Univerza v Edinburghu, Univerza v Torontu. meldet Alexander Graham Bell sein Telefon zum Patent an und verbesserte es immer weiter, bis es im Jahre als Telefon praktisch einsatzfähig war. So konnte er dann die erste transamerikanische Sprechverbindung zwischen San Franzisko und New York einweihen. Im Juli gründete Bell die „Bell Telephone Company\". İskoçya asıllı ABD'li bilim adamı Alexander Graham Bell, 3 mart 'de doğdu. 7 mart 'da telefonun patentini aldı. İlk telefon şirketi olan Bell telefon şirketini 'de kurdu. Bell telefon şirketi bugün ABD'nin en büyük şirketlerinden biridir. Alexander G. Bell und das Telefon des Antonio Meucci[Bearbeiten |. Die Erfindung des Telefons geht auf mehrere Personen zurück. Wer hierbei als der wahre Im Telefon von Reis erfolgte die Wandlung von Tönen zu Stromänderungen mittels des Prinzips des Alexander Graham Bell kam im Laufe dieser Ereignisse in den Besitz von Meuccis Materialien und Unterlagen. Als Meucci Mitte des Jahrhunderts wird das Telefon gleich vierfach erfunden. Am Ende aber kassiert Alexander Graham Bell den Ruhm. Alexander Graham Bell was the first to secure a patent for the telephone, but only just. And it almost cost him his marriage Im Alter von elf Jahren beschloss.\n Alexander Graham Bell Telefon\n Alexander Graham Bell Telefon\n\n Und Alexander Graham Bell Telefon, Poker. - Block OG Menu Simple\n\n Doch nach wie vor konnte in einem Kabel nur ein Telegramm auf einmal gesendet werden.\n\n Bell was born on March 3, , in Edinburgh, Scotland. After attending school in Scotland and London, the year-old immigrated to Canada with his parents in Italian inventor and engineer Guglielmo Marconi developed, demonstrated and marketed the first successful long-distance wireless telegraph and in broadcast the first transatlantic radio signal.\n\n On September 1, , a Boston woman named Emma Nutt made history—and all she had to do was pick up the phone. Her soothing voice helped usher in a new era of telecommunications and In his 84 years, Thomas Edison acquired a record number of 1, patents singly or jointly and was the driving force behind such innovations as the phonograph, the incandescent light bulb and one of the earliest motion picture cameras.\n\n\n\n\n For years, scientists and Live TV. So konnte er dann die erste transamerikanische Sprechverbindung zwischen San Franzisko und New York einweihen.\n\n Bis zu seinem Tode im Jahre beschäftigte sich Bell mit vielen weiteren Entwicklungen und Erfindungen auf zahlreichen technischen Gebieten.\n\n Er unterstützte die beginnende Luftfahrt, baute schnelle Motorboote und befasste sich auch mit der Tierzucht. Im Uppdaterad: 15 november Publicerad: 02 november Vem uppfann telefonen?\n\n Telegrafens historia. Kampen om telefonen Artikel i tidningen Illustrerad Vetenskap där du kan läsa om telefonens uppkomst och patentstriden.\n\n Kategorier: Sverige under talet. Vetenskap, teknik och kommunikationer Dokumentär och film. Resor och transporter. Sveriges industrialisering.\n\n Fonografer och grammofoner. George Stephenson. Kända historiska personer Historiesajtens stora uppslagsverk om historiska personer. Marca leta sta Bell in Pollok obiskala slavnega znanstvenika Josepha Henryja.\n\n Toda Bell ni imel opreme in sposobnosti, da bi lahko zgradil model po svojih zamislih. Istega jutra je Bellov odvetnik izpolnil patentno prijavo za telefon v lokalnem patentnem uradu.\n\n Ker pa je bil odvetnik stalna stranka urada, je Wilber privolil. Pinaud's experience in boat-building enabled him to make useful design changes to the HD Bell's report to the U.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n In partnership with Gardiner Greene Hubbard , Bell helped establish the publication Science during the early s. In , Bell was elected as the second president of the National Geographic Society , serving until , and was primarily responsible for the extensive use of illustrations, including photography, in the magazine.\n\n\n\n\n\n\n\n\n On the behalf of the citizens of Canada, may I extend to you an expression of our combined gratitude and sympathy. Bell's coffin was constructed of Beinn Bhreagh pine by his laboratory staff, lined with the same red silk fabric used in his tetrahedral kite experiments.\n\n\n\n\n\n Beinn Bhreagh , Nova Scotia , Canada. University of Edinburgh University College London. Mabel Hubbard. Gardiner G. Hubbard father-in-law David C.\n\n Bell uncle Gilbert H. Re-identified in , Bell made this wax-disc recording of his voice in Main article: Invention of the telephone. Main article: Elisha Gray and Alexander Bell telephone controversy.\n\n Further information: The Telephone Cases. Further information: Beinn Bhreagh, Nova Scotia. Main article: Photophone.\n\n Play media. Main article: HD See also: Bell Telephone Memorial. This list is incomplete ; you can help by adding missing items with reliable sources.\n\n Bell, Alexander Graham October Bibcode : AmJS Also published as: Bell, Alexander Graham September 23, Bibcode : Natur.. Bell, Alexander Graham Washington, D.\n\n Archived from the original PDF on October 29, Retrieved January 2, Bell, Alexander Graham February The National Geographic Magazine. National Geographic Society.\n\n To the end of his days, when discussing himself, Bell would always add with pride \"I am a teacher of the deaf\". When he moved to Canada in , Canadian and British citizenship were functionally identical, with Canadian citizenship only becoming a formal classification in He applied for American citizenship after , gained it in , and referred to himself as an American citizen from that point on.\n\n Quote from Bell speaking to his wife: \"you are a citizen because you can't help it — you were born one, but I chose to be one.\n\n\n Bell is to be congratulated upon being able to receive the recognition of his fellow citizens and fellow countrymen\". Bell's dislike of the telephone.\n\n\n The telephone, of course, means intrusion by the outside world. And the little difficulties and delays often attending the establishment of conversation But all really important business over the telephone he transacted himself.\n\n There are few private houses more completely equipped with telephones than ours Bell was more particular about than our telephone service We never could have come here [to Beinn Bhreagh] in the first place or continued here, but for the telephone which kept us in close touch with doctors and neighbors and the regular telegraph office Bell did like to say in fun, \"Why did I ever invent the Telephone,\" but no one had a higher appreciation of its indispensableness or used it more freely when need was—either personally or by deputy —and he was really tremendously proud of it and all it was accomplishing.\n\n It received its historical designation from the Government of Canada on June 1, Mabel's exact age when she became deaf would later play a part in the debate on the effectiveness of manual versus oral education for deaf children , as children who are older at the onset of deafness retain greater vocalization skills and are thus more successful in oral education programs.\n\n Some of the debate centred on whether Mabel had to relearn oral speech from scratch, or whether she never lost it. It was invented in Brantford at Tutela Heights in the summer of Others transmitted a sound or a click or a buzz but our boys [Bell and Watson] were the first to transmit speech one could understand.\n\n Bell was so ecstatic that he wanted to jointly name his new invention and his new daughter Photophone Greek: \" light—sound \" , [] [] Bell wrote: \"Only think!\n\n Mabel's baby screamed inarticulately but mine spoke with distinct enunciation from the first. Bell quickly disassembled it and effected a repair, to the owner's amazement.\n\n When asked how he was able to do so Bell only needed to introduce himself. Bell also chose maroon-colored silk as it would show up clearly against the light-colored sky in his photographic studies.\n\n Views of an Expert. Hammondsport , New York, March 12, Boulton and was also created independently by Robert Esnault-Pelterie and several others.\n\n Attending the formal ceremony were Bell's daughter, Mrs. To each side of the portico facing the monument are the engraved inscriptions \"In Grateful Recognition of the Inventor of the Telephone\".\n\n Its dedication was broadcast live nationally by the Canadian Broadcasting Corporation. His wife, Mabel, daughter Daisy, and son-in-law David Fairchild had gathered around him.\n\n His last view was of the moon rising above the mountain he loved\". Halifax, Nova Scotia: Formac Publishing. IEEE Spectrum. April 30,\n\n Alexander Graham Bell Telefon His family was long associated with the teaching of elocution: his grandfather, Alexander Bell, in London, his uncle in Dublinand his father, in Edinburgh, were all elocutionists. While Wurzelimperium Pflanzen and evenings were occupied by his teaching and private classes, Bell began Imperial Casino stay awake late into John Hesp night, running experiment after experiment in rented facilities at his boarding house. Bell\" and served the next year as an instructor at Somerset College, BathEngland, his brother's condition deteriorated. Retrieved January 1, Archived from the original on August 2, On March Die Siedle Ronline, Bell used \"the instrument\" in Boston to call Thomas Watson who was in another room but out of earshot. Gardiner G. Italian inventor and engineer Guglielmo Marconi developed, demonstrated and marketed the first successful long-distance wireless telegraph and in broadcast the first transatlantic radio signal. The Franklin Institute. Bell uncle Gilbert H. Telefón z roku (Švédsko) Zvyčajne sa vynález telefónu prisudzuje vynálezcovi menom Alexander Graham Bell. Jeho prvý telefón bol zostrojený v Bostone (USA) v roku The story of Alexander Graham Bell and Canada’s greatest invention is told in one teen pop song. In our version of the story, Bell only sees the fun advantag. Alexander Graham Bell Bell c. Born March 3, Edinburgh, Scotland Died August 2, () (aged 75) Beinn Bhreagh, Nova Scotia, Canada Citizenship United Kingdom (–) British-subject in Canada (–) United States (–) Alma mater University of Edinburgh University College London Occupation Inventor Scientist Engineer Professor a Teacher of the deaf. Alexander Graham Bell, (born March 3, , Edinburgh, Scotland—died August 2, , Beinn Bhreagh, Cape Breton Island, Nova Scotia, Canada), Scottish-born American inventor, scientist, and teacher of the deaf whose foremost accomplishments were the invention of the telephone () and the refinement of the phonograph (). Alexander Graham Bell kemudian mencapai sukses secara komersial berkat telepon. Sakarang ini AT & T merupakan perusahaan bisnis yang terbesar di dunia. Bell dan istrinya yang di bulan Maret memegang 15 persen saham dari perusahaan itu tampaknya tak punya bayangan betapa akan fantastisnya keuntungan yang bakal diterima oleh perusahaan itu.\n Alexander Graham Bell Telefon\n\n\n 0 Kommentare\n\n Eine Antwort schreiben\n", "pred_label": "__label__1", "pred_score_pos": 0.6190646886825562} {"content": "All About Child Safety Seats For Infants And Kids\n\nChild safety has to be a top priority in today’s world. This is because we do not know what tomorrow brings and this usually includes the things that our children can do. They are innocent and at the same time they are much too young to understand what dangers might be involved when playing around. We cannot stop all the bad things that may happen but we have to be aware of the good things that can happen. In this article we will be talking about some child safety tips that you can use right now.\n\nOne of the first child safety tips I can give you is to always consider the safety of your children no matter how old they are. Never leave them unsupervised especially with their own senses of curiosity and fear. Another thing that you should remember is the need for child safety devices. The abandonment infant protection act was made for parents who leave their children in unattended situations.\n\nParents should keep children safe by teaching them how to stay away from dangerous situations. Parents should teach their kids how to stay away from heights because most of the accidents that they are suffering nowadays are caused by falling. Parents should also keep children safe by letting them play in the yard in a way that there are no dangerous toys or things that they can get stuck on. It can be annoying to hear a child screaming but it is important for them to know that there are hazards around them like stairs, open doors, sharp edges of furniture and the list goes on.\n\nThere are many child safety seats and other gadgets that you can buy today to prevent any accidents. One of the gadgets that is really helpful in preventing any injuries is the Parachute Pillow. It is able to prevent suffocation from any heights, it can prevent head injuries, blunt force trauma and cuts. If you are buying a child safety seat for your kid to prevent any mishap then it would be better if you are going to look for the one that has got a good reputation.\n\nParents should teach children at an early age that they should never walk or stand on top of things because they might be pushed off and lead to death. They should also teach children about CPR, which is also known as cardiopulmonary resuscitation. This is basically the method of breathing manually after a person has been affected by a cardiac arrest. It is also known as chest compressions.\n\nThe child safety equipment should be such that it can help them during any emergency. It is also important to ensure that the first aid kit in the house is stocked with all the basic medicines and first aid kits. A good number of the incidents that happen to occur at home involve children. The most common of these is drowning where kids will go under water and become unidentifiable. Therefore, it is advisable to always ensure that the child safety equipment is always with them and it is kept ready for use.\n\nSchool bus safety is another very important area of child safety. Children who are below 12 years old cannot drive a bus but there are child safety seats that can hold them back. These are also useful for keeping them away from sharp edges. There are several school buses out there that have seats that are made with high backs that provide the child safety seats with their support. This is essential if they want to get hurt during an accident.\n\nWhen you are choosing school bus safety seats or infant seats for infants, you should always keep the safety of the child in mind. There are some products that have very good insulation which makes them perfect for keeping the baby warm during winter. They are also made with the baby’s comfort in mind. If you would like your baby to be safe during an accident, then you should buy him or her one of the best child safety seats available today.", "pred_label": "__label__1", "pred_score_pos": 0.6440635919570923} {"content": "Fashion that Changed the World (9783791347899)\n\nWhat did Vogue's first cover look like? When did film stars become part of the fashion industry? What led to the development of ready-to-wear clothing? How did the paintings of Mondrian, Dali and Warhol end up on the runway? These and other questions are answered in this eye-opening look at different aspects of the history of fashion - from Elizabeth I's \"Mask of Youth,\" to Lady Gaga's \"meat dress.\" Arranged by topic, the lavishly illustrated chapters explore themes such as war and the military; ready-to wear; fashion in film, art, and sports; celebrity; gay and lesbian fashion; globalization and the internet. Fashion That Changed the World digs into a multitude of social, economic and cultural factors that changed the course of fashion over the last few hundred years. Filled with colourful images - many of them full-page - and extensive essays that are both informative and engaging, this indispensable reference offers a historical snapshot of what we used to wear and why we choose the clothes that we do today.\n\nFashion that Changed the World (9783791347899)\n\n • ISBN\n\n\n • Language\n\n English US\n\n • Format\n\n\n • Publisher\n\n Kaplan Trade\n\n • Author\n\n Mary Gehlhar", "pred_label": "__label__1", "pred_score_pos": 0.8842747211456299} {"content": "IONIA Limited Edition Dark Package Design\n\nIONIA olive oil aims to incorporate ancient Greek tradition into its design. What may seem like a fun, bold layout actually has another meaning behind it that connects this modern olive oil brand to the traditions of the past.\n\nIONIA Limited Edition Amazing Package Design\n\nIn ancient Greece, people would decorate their olive oil containers in their own unique way. To maintain that feeling of original design from the ancient Greeks, IONIA had a range of label formats created for their bottle; each one looks unique. This immediately sets IONIA apart from almost every other brand that values a consistent appearance on every product. However, the brand identity is not lost in any design. Turn the bottles so the name cannot be seen, and a bystander would still recognize an IONIA bottle, regardless of label composition.\n\nIONIA Limited Edition Package Design\n\nWith so many unique labels on the containers, some IONIA bottles sport a dark, bold label. Others are brighter, with some lines and shapes drawn on. It almost feels like every bottle is another to add to a consumer’s collection. The words, “The history of uniqueness,” are shown on each label, right below the logo. That brand statement isn’t just four short words; it clearly extends into their design and visual branding.\n\nIONIA delivers a unique label design for each, unique person. Their company doesn’t just bring the taste of ancient Greece home, it also carries the appearance, feel, and experience.\n\nIONIA Limited Edition is an amazing package design in the Food & Beverage industry.", "pred_label": "__label__1", "pred_score_pos": 0.7818056344985962} {"content": "\n\nHow to fix low signal problem on the Micromax Canvas Juice A177?\n\nHi there. Is it like that since you bought it? Low signal issue may also be caused by your network and interference in your area.\n\nNot the answer you were looking for?", "pred_label": "__label__1", "pred_score_pos": 0.8342413902282715} {"content": "STEM vs STEAM vs STEMM(usic)\nFew of us would argue against music's transformative powerful. Whether one is a consumer, producer, or critic, music's connection to our culture and to ourselves is certainly no secret. However, the reasons why have not always been visible to us scientifically. It is challenging to capture in data points the impact of subjective experiences. Now science is helping us understand what many of us have always known: music matters and is a key elevator of brain function and interdisciplinary connections. It has the power of at once being able to synthesize what we know while also transcending what we know. It is a key to harnessing the mysteries and capabilities of the human brain's capacity. Music is unique, unparalleled in its effects, and worth much more than school, industry, and commercial markets often reflect.\nAccording to the following research, it might seem that the \"STEM\" movement (Science, Technology, Engineering, and Mathematics) misses [M]usic as a vital agent of synthesis. While some have argued anecdotally that STEM also needs [A]rts (STEAM), this research shows more specifically that among the arts, music is unique in its effect on brain activity and cognitive executive functions.\nQuestions:  What should be the impact of this research? Should this elevate the arts in our views of education and behavioral sciences, or, more specifically should music alone be elevated in this way? Is this evidence for the needed expansion of music in our schools and through society at-large via government programs? Is there something to be said for the value of arts independent of its commercial value and therefore, should society bear more responsibility in ensuring support?\nAll Posts\n\nAlmost done…\n", "pred_label": "__label__1", "pred_score_pos": 0.9588563442230225} {"content": "$1 for 3 months\n$1 for 3 months\n\nColumn: Lawmakers should fix Ohio’s drug sentencing laws\n\nAndrew Geisler\nAndrew Geisler, Guest columnist\n\nAs coronavirus cases continue to rise, so do cases of domestic abuse, depression, drug addiction and accidental overdose — collateral consequences of the disease that might be more hidden but no less deadly than the virus itself. In the General Assembly’s post-election lame duck session, it has an opportunity to address some of these lurking dangers. It should take it.\n\nSenate Bill 3, for example, would comprehensively reform Ohio’s drug sentencing law so that those battling drug addiction receive treatment rather than just a conviction. The pending legislation balances the community’s need for public safety and the individual’s need for effective treatment by maintaining Ohio’s harsh criminal sanctions for predatory drug traffickers while recognizing that nonviolent drug users searching for sobriety present more of a public health concern than a criminal menace.       \n\nFor too long, Ohio has relied mistakenly on the criminal corrections system to house and care for those struggling with drug addiction — spending on average $26,000 per inmate, per year. The state imposes overly broad criminal sanctions that prove far less effective at curbing drug abuse and low-level drug crime recidivism than facilitating targeted treatment programs clinically designed to rehabilitate drug users and nonviolent offenders.\n\nSenate Bill 3 corrects that mistake. By reclassifying low-level drug offenses from felonies to misdemeanors, the overdue statutory reform saves the state money, puts more people on a smoother path to recovery and removes a significant barrier to long-term drug rehabilitation. Felony convictions carry hundreds of collateral consequences that persist well after the defendant has served time — chief among them: a much harder time finding employment.\n\nWithout gainful employment, those struggling with addiction battle depression and poverty that can make the hard climb to sobriety so much slipperier. Without a job, recovering addicts return too easily to the dangerous “escape” of narcotics and overdose.\n\nAs Dr. Mark Hurst, the former Ohio Department of Health medical director, once explained, long-term change for those struggling with addiction “requires counseling, requires medication frequently, and it requires rebuilding the life…. Employment is a really important part of recovery and rebuilding somebody’s life. And a felony conviction is a major barrier to that.”\n\nSenate Bill 3 removes this unnecessary barrier for low-level drug possession offenses and creates the legal presumption that first-time offenders be sentenced to treatment programs, not incarceration. But the bill recognizes that first-time offenders and recalcitrant repeat offenders are not the same. Anyone convicted of a third possession offense in a three-year period would be convicted of a felony and face all of the incumbent consequences.\n\nSome skeptics contend that judges must retain the threat of imposing felony convictions on even low-level possession offenders in order to encourage participation in drug treatment programs. But according to a study in the Journal of the American Medical Association, a prison sentence has little, if any, deterrent effect on future drug use by nonviolent drug offenders.\n\nSenate Bill 3 acknowledges this fact. Its common-sense reform would align Ohio’s drug sentencing law with national best practices and criminal justice research. Taking an evidence-based approach, the legislation rightly distinguishes between those struggling with addiction and those preying upon the community. It ensures that Ohio law better reflects the complex nature of addiction by providing treatment for users and punishment for traffickers. \n\nAs the pain and suffering brought on by the coronavirus continue to plague Ohio communities, the General Assembly can take immediate steps to improve the law and help those struggling with drug addiction get the treatment they need and achieve long-term success. And those are always steps worth taking.\n\nAndrew Geisler is a legal fellow at The Buckeye Institute and an expert in criminal justice reform. He is the author of “Senate Bill 3: Myth vs. Reality.”", "pred_label": "__label__1", "pred_score_pos": 0.6460658311843872} {"content": "4 Symptoms of a Bad Car Thermostat\n\nTwo thermostats sitting against the pavement.\n\nA bad car thermostat can be difficult on your wallet because it can ruin the car’s engine if you’re not careful. This is a critical component that, when faulty, must be repaired immediately. Read on to know more about the symptoms or warning signs of a bad car thermostat.\n\n1. Overheating\n\nA bad thermostat can cause the car to swelter, as the thermostat is a heat-sensitive control device situated at the radiator hose. When the temperature of the engine reaches its normal operating temperature, this device should open to allow coolant to flow into the engine to regulate the heat. If the thermostat is stuck closed, antifreeze won’t flow from the radiator, resulting in the car overheating. Thus, if this happens, one of the possible causes is a broken thermostat.\n\nThis problem can definitely be attributed to other issues with the cooling system, such as leaking hoses, but checking for a bad thermostat should be on your list as well since this is a fairly cheap, easy fix.\n\n2. Under Heating\n\nIf the thermostat is trapped in an open setting, it leads to engine under heating. The open setting means that coolant will be constantly moving into the engine, regardless of whether it is hot enough to need it. Instead of ending up too hot all the time, the engine will then have an issue with being too cool.\n\nIf you have been driving for a few minutes and your vehicle’s temperature gauge needle is still sitting close to the bottom, it’s time to check your thermostat.\n\n3. Temperature Fluctuations\n\nA malfunctioning thermostat will result in odd temperature fluctuations throughout the operation of the engine. In this case, the thermostat won’t be stuck in any one position, but there will still be false readings causing problems with regulation. The engine temperature will change erratically while the radiator coolant is prohibited from flowing normally.\n\n4. Poor Engine Performance\n\nIf the engine’s operating temperature is all over the place while trying to function, engine performance will ultimately suffer. This could lead reduced gas mileage and, eventually, damage that will cost a bundle to fix.\n\nIf you notice any of these issues, don’t hesitate to pop open your hood and check out your car’s thermostat. A new thermostat can be purchased at your local auto parts store and the repair is an easy one that can be done yourself if you’re looking to save some money.", "pred_label": "__label__1", "pred_score_pos": 0.9111601114273071} {"content": "Mumbai: Driving by car with others? Wearing a face mask is a must\n\nThe Brihanmumbai Municipal Corporation (BMC) clarified on Monday that clean-up marshals would not fine a person for being maskless in a private car, if they were the only person in the vehicle.\n\n“If a person is unmasked and driving but there is no co-passenger in the car, then that person will not be penalised by marshals,” clarified Additional Municipal Commissioner Suresh Kakani on Monday.\n\n“But if there is more than one person in the car, including the driver, then it’s best that everyone is masked or else they will be penalised if caught by the marshals,” Kakani said. He emphasised that passengers travelling in kaali-peelis, app cabs, autorickshaws and two-wheelers had to necessarily be masked while on the go.\n\nEarlier in January, the civic body had issued fresh guidelines stating clean-up marshals would no longer fine people for not wearing masks if they were in a private car. This move came after Mumbaikars complained on social media that they were being fined even when they were safely confined to their cars.\n\nBut given the sudden rise in the number of Covid-19 cases in Mumbai, the civic body has altered its stance.\n\nTo ensure that the public is in strict compliance with Covid norms, the BMC has deployed more than 2,000 marshals across the city. These marshals have been aggressively fining violators of Covid protocol in the city, including those travelling in private vehicles and cabs.\n\nKakani said the reason for modifying the rule was for the greater good of Mumbaikars.\n\n“One doesn’t really know if their driver is adhering to safety protocols or if the interiors of a cab are thoroughly sanitised, so it is better that everyone wear a mask for the collective good, now that cases are on the rise continuously,” Kakani observed.\n\nCan lower mask at roadside eateries\n\nAn individual would also be exempt from penalty if they were seen setting down their masks while eating or drinking at a roadside eatery.\n\nOn February 20, the BMC had fined more than 16,000 individuals for not wearing masks, collecting a whopping Rs 32 lakh in fines, the highest single-day collection so far.\n\nCivic officials said many of the violators were fined at roadside eateries, tea stalls and gyms.\n\n“If anyone is having a snack or beverage at a roadside eatery or restaurant, then it is understandable that the mask is kept aside, while eating or drinking. However, those serving them should wear masks,” Kakani said.\n\nMeanwhile, in the past three days, the BMC filed FIRs against multiple pubs, restaurants and banquet halls after finding patrons flouting Covid protocols. The civic body will be monitoring these establishments strictly in the coming days, he said.\n\n“If any of these establishments are seen repeating the same mistakes, then their premises may be sealed or their commercial licences will be revoked,” Kakani warned.\n\nFree Press Journal", "pred_label": "__label__1", "pred_score_pos": 0.8297809362411499} {"content": "The Aquaduct Bicycle\n\n\n\nThis unique bicycle won the 2008 Innovate Or Die contest and was created by five IDEO engineers and designers. The Aquaduct allows a person to carry a large amount of water while filtering it into clean drinking water at the same time.\n\nContinue reading… “The Aquaduct Bicycle”", "pred_label": "__label__1", "pred_score_pos": 0.9983310103416443} {"content": "Samantha Dress\n\n\nOur asymmetric sweatshirt dress is made with our ultra-soft French terry in a roomy silhouette, creating a go-to garment that's as cozy as it is cool. Featuring a classic round neckline and a cascading asymmetric skirt for a touch of edge, it's perfect for pairing with your favorite fall boots.\n\nComplete the look\n\npeople also bought", "pred_label": "__label__1", "pred_score_pos": 0.5211181044578552} {"content": "Classifying Potent and Highly Potent Molecules\n\nAugust 1, 2018\nJeff Pavlovich\n\nJeff Pavlovich is senior process safety engineer at Cambrex.\n\nPage Number: s18–s20, s33\n\nDetermining how much containment is needed for API handling requires evaluation of multiple factors.\n\nHighly potent drugs represent a growing proportion of medicines, including therapies in development and those commercially available. As older products reach patent expiry, generic-drug companies are also moving into this space, creating an increasing demand for capability and capacity to manufacture highly potent APIs (HPAPIs), particularly for contract manufacturing organizations (CMOs).\n\nA significant proportion of HPAPIs are in the oncology field, and as approximately one-third of all new drug approvals are currently cancer medicines, this represents a substantial market opportunity. Other therapeutic areas where drugs may be highly potent include asthma and pain management.\n\nThe chemistry to make these molecules is not necessarily difficult; however, the greater challenge is in the handling and containment of them to ensure operator and environmental safety. It is vital that a careful assessment is made of the hazards posed by each individual product, reagent, and intermediate involved in the synthesis ahead of manufacture. If the risks are underestimated, people within and around the plant will be in danger. Conversely, if the risks are overestimated, the result will be excessive amounts of money spent on containment and an increase in project costs.\n\nA compound is deemed to be potent in pharmaceutical terms if it has an eight-hour, time-weighted average occupational exposure limit (OEL) of 10 µg/m3 or less. There is, however, no formally agreed definition of the OEL level that constitutes a “highly potent” compound. To add to the confusion, the same compound might be classified differently by individual risk assessors. This variability in classification is exemplified by a study carried out by Cambrex in which a panel of 38 molecules was sent to three risk assessors. Three different results were provided: one assessor deemed five of the 38 to be highly potent, one assessed 37 of the 38 to be highly potent, and the third fell somewhere between the two extremes.\n\nThe subjective nature of these results highlights that any CMO managing a facility to manufacture multiple APIs that may, or may not, be highly potent should consider each project on a case-by-case basis. A flexible approach allows manufacturing techniques, equipment, and containment options to be tailored to the molecule’s properties, and the requirements of each individual step of the synthesis. The result should be increased safety, lower costs, and enhanced capacity for the manufacturing of HPAPIs.\n\n\n\nRisk determination\n\nWhen determining risk, the starting point is the OEL and other safety-related properties of the molecule determined as part of the drug development process. Once an investigational drug reaches the large-scale manufacturing stage, extensive safety data will have been compiled, including results from preclinical toxicology assessments, animal studies, and early-stage clinical trials.\n\nThese data on potential hazards and dose–response effects are used as a basis by experts in risk assessment to generate OELs and occupational exposure bands (OEBs) that allow informed decisions to be made about engineering strategies and industrial hygiene requirements. Appropriate containment and personal protective equipment should be supplemented by comprehensive training to ensure their proper use.\n\nThere is an important caveat. Although toxicological data offer a useful starting point, there is a difference between potency and toxicity. Potency is a measure of how much of the API is required to have a therapeutic effect; toxicity is a measure of its adverse effects. A cytotoxic drug to treat cancer may be extremely toxic but its potency might be low, and therefore, side-effects are likely. Conversely, for some drugs that only require very small doses to have a medical benefit, the dose that causes side-effects may be substantially larger. The handling requirements in the manufacturing plant will be very different for the two.\n\nToxicology data gleaned from preclinical research or clinical trials are not designed for direct application to OELs, either. The aim of an early-phase clinical study is to determine optimal doses, balancing therapeutic benefit and what patients can tolerate. There is a huge difference between exposure in this context, and the inadvertent inhalation of dust in a manufacturing facility; there is no direct correlation between these clinical trial data and the safe exposure level for operators.\n\nThe data will, however, provide indications to issues that might occur with acute exposure. If they highlight issues such as respiratory problems, lachrymatory issues, adrenergic concerns, or somnolence, for example, acute problems might be anticipated in manufacture. There may be indicators toward chronic exposure issues, also, if there are indications that the compound might be carcinogenic, mutagenic, a sensitizer, or a clastogen.\n\nWith this information in hand, the next step is to identify any critical effects that exposure might have, such as target organ toxicity or pharmacological effect, and the dose-response curve. However, inter-person variation makes it difficult to make a definitive risk assessment.\n\nAt the lower end of the dose–response curve (Figure 1) is no-observed-effect level (NOEL), where the chemical causes no effect at all. The next point moving up the curve is the no-adverse-event level (NOAEL), which is commonly cited in risk assessments. Next, there are the analogous low-effect level (LOEL) and low-adverse-effect level (LOAEL), and then doses that are well tolerated, followed by the maximum tolerated dose (MTD). Past this point, the APIs are likely to be hazardous. In animal tests, at the ED50 point, half of the animals will experience an effect; at the TD50 point, half will experience toxicity; and at the LD50 point, half the study animals will die at that level of exposure.\n\n[Eq. 1]\n\nOEL (μg/m3) =PoD x BW/UFc X MF x V\n\n\nOEL is occupational exposure limit\nPoD is point of departure for extrapolation (mg/kg-bw/day)\nBW is body weight (kg)\nUFc is composite uncertainty factor\nMF is modifying factor\nV is volume of air breathed during work shift (m3)  \n\nThe OEL equation (Equation 1) includes uncertainty factors (Table I) that compensate for unknowns. The numerator comprises factors that will increase occupational exposure, while the denominator includes those that will reduce it, including uncertainty factors. Those components that can contribute to uncertainty include variation between species and between subjects, the duration of the study, the severity of the effect, bioavailability and bioaccumulation, and pharmacokinetics.\n\n\nArea of uncertaintyUncertainty factors\nIntraspecies variation10\nInterspecies variability2–12\nStudy duration3–10\nLow-effect level (LOEL) to low-adverse-effect level (LOAEL)10\nDatabase sufficiency1–10\nSeverity of effect1–10\n\nModifying factors are also considered by some risk assessors, including the slope of the dose–response curve, and the choice of critical effect and its clinical significance, its reversibility, and its relevance to workers. Susceptible subpopulations and read-across similarity may also be considered, as may a lack of independence for uncertainty factors.\n\nThis uncertainty is at the root of the variability in risk assessments. Depending on the magnitude of uncertainty values that are applied, and whether modifying factors are given weight, there is the potential for as much as eight orders of magnitude of difference in the OEL determined by individual assessors. Reconciling this variability in the final risk assessment is a major challenge.\n\nThe solution lies, at least in part, in applying real-world context to the uncertainty factors. Perhaps the most important is the acceptable exposure risk for an individual operator, and even for the most conservative risk assessor, a one-in-one-thousand risk may well be more realistic than the one-in-one-million risk to be an appropriate likelihood of an exposure happening. The one-in-one-thousand risk is not without context: it is commonly cited as the chance of a severe injury in a hazardous work environment.\n\nThree orders of magnitude difference in acceptable exposure risk can represent a major difference in cost. If an API is placed in a higher OEB in the absence of data and with a large weight placed on uncertainty factors, then far more costly containment will have to be employed, and the manufacturing process will take longer. How necessary is it that the API is treated as so much more hazardous? And what about the intermediates involved in its production? It is less likely that there will be a calculated OEL for those intermediates.\n\nIt is important to carefully consider exposure modifiers. Is the process likely to generate dust? If so, the likelihood of airborne hazard is far greater. How long will the operator be exposed to the material? Theoretical OELs are based on an eight-hour exposure; however, the time of potential exposure may be only a few minutes. A case-by-case assessment of the actual facility, process, and procedures will give a far more realistic picture of the hazard. There may be limits on how long people can work on individual projects because of the potential for chronic effects. If an API is a known teratogen, it may be advisable for pregnant women to keep well away.\n\n\n\nDetermining OEBs\n\nOccupational exposure bands are a useful tool for matching a hazard with containment requirements. APIs that fall into OEB1 are non-toxic, and a standard exposure level of 500 µg/m3 will suffice. OEB2 compounds will have special hazards, such as carcinogenicity, and the OEL will need to be lower.\n\nAt OEB3, where the hazards are greater but not extreme, the opportunity to customize handling to account for real-world situations is greater; this is where the greatest cost and time savings might be anticipated. Here, the containment could-and should-be designed around the process itself. The existing plant may suffice; alternatively, safety requirements might be met by introducing high-efficiency particulate air (HEPA) filters or soft-sided isolators, a more conservative approach than simply using personal protective equipment. The risk assessment should also consider the solvents and whether they can degrade processing or containment equipment. A program of surrogate testing is required to prove that the containment strategy is appropriate and working successfully before the hazardous material is introduced.\n\nOEB4 APIs are more highly potent and toxic, and special handling and careful containment will be required. An additional band, OEB4+, encompasses compounds that are so potent that their OEL falls below 0.1 µg/m3. For OEB4 and OEB4+ compounds, the opportunity for customization is limited, and the process must be designed around the containment, and not the other way around. Dedicated isolators will most likely be employed, and rapid transfer ports for APIs deemed to be OEB4+.\n\nThis type of complete containment is extremely expensive, and while the conservative approach would be to use such containment for all highly potent compounds, in reality it may be overkill for OEB3 APIs. Instead, it may be more realistic to start out with the assumption that full containment is required, but then relax the handling requirements as further data become available, if the data suggest this will be safe. This level of flexibility will allow a CMO to offer its customers a more cost-effective solution, and faster timelines.\n\nAbout the author\n\nJeff Pavlovich is senior process safety engineer at Cambrex.\n\nArticle Details\n\nPharmaceutical Technology\nSupplement: Outsourcing Resources\nVol. 42\nAugust 2018\nPages: s18–s20, s33\n\n\nWhen referring to this article, please cite it as J. Pavlovich, \"Classifying Potent and Highly Potent Molecules,\" Pharmaceutical Technology Outsourcing Resources Supplement (August, 2018).\n\n\n\ndownload issueDownload Issue : Pharmaceutical Technology-08-01-2018", "pred_label": "__label__1", "pred_score_pos": 0.9185606837272644} {"content": "Revisit the early 1990s on the last years of the D&H and the ushering in of CP Rail to new territory in the US. This was a very colorful era in the Northeast and dramatic changes were still in effect from ripples of the bankruptcy of the old Penn Central days. We cover the history of the D&H and its sad demise. Don’t miss the parade of older and borrowed power that came from all over North America.\n\nThis was also a time when CP Rail was consolidating its extensive US-based rail lines. We bring you power from the D&H, Soo Lines and from lines such as CSX, NS, Conrail, leasing companies and others.\n\nThis new video is the perfect companion to the first Northeast Rails DVD that covered the success of the Conrail in the late 1980s. Revel in wonderful scenery, colorful power, “Fallen-Flags” and graffiti-free trains in a by-gone era that will never come back again.\n\nCharles Smiley Productions DVD. 93 minutes.", "pred_label": "__label__1", "pred_score_pos": 0.954230785369873} {"content": "Car Accident Checklist: What Should You Do After A Car Accident In Texas\n\nDriving is a risky business and with over 270 registered vehicles in the United States, chances are it’s only a matter of time before you experience some kind of car accident. As a matter of fact, if you haven’t been in a car accident, you should consider yourself extremely lucky. Statistics say that you will file a claim for a collision about once every 17.9 years. That means that if you got your driving license at age 16, there is a big chance that you will experience some sort of car crash by the time you are 34. Or, if we put it over the course of a long driving lifetime, you should have a total of three to four car accidents in your life. The good news is that most of these car collisions won’t be deadly since just three out of every one thousand accidents involve fatalities. \n\n1 1\n\nIn reality, even a seasoned driver may feel unsure of what to do right after a car crash. While preparation cannot prevent it from happening, it can surely help in order to limit the damage in the moments afterward and the days which follow. Taking part in a car crash is a shocking and frustrating ordeal nobody wants to experience. A fine preparation in advance can do no harm and could save your life and potentially hundreds if not thousands of your hard-earned dollars. \n\nIn this article, we are going to cover all the things you should do after you have taken part in such an event. \n\n#1 Stop and check for injuries \n\nYou are peacefully driving while listening to your favorite song on the radio when another vehicle slams into your car. The damage is done and there is no turning back. What should you do right now?\n\nFirst things first, there is nothing more important than your health and wellbeing. Even though it’s going to be really difficult to remain calm and focused – that’s exactly what you should do. Stop immediately and check for injuries. After you make sure everything is OK with you, get out of the vehicle and check on everyone else involved in the car crash. \n\n#2 Call 911 if there is anyone injured\n\nIf anyone sustained an injury in the process, don’t wait and call 911 to get the proper help. Let the dispatcher know about the sustained injuries or fatalities you can speak of, and make sure they are made aware of any hazards that emergency medical services and police should know before they arrive at the scene. \n\nUse the closest address or mile marker when describing the location through the phone. Describe absolutely everything that you can think of which may help the medical service in order to arrive quickly and act right away such as the direction you were traveling and which side of the road your car is on. \n\n#3 Deal with the police\n\nWhen the police arrive at the crash scene, make sure you thoroughly follow their instructions since they are highly trained in accident investigations. Stay present at the scene and answer any questions they ask honestly. The police officers are authorized to coordinate the care and transport of the injured, make the necessary arrangements to have the disabled cars towed, secure the scene, issue traffic citations, verify insurance information of the drivers, make arrests when needed, collect evidence and file a police crash report. \n\nWith the filing of a police crash report, the police gather all the necessary information about the car accident such as driver information, vehicle data, and injury reports. Also known as the CR3 Peace Officer Report, the sole custodian for these kinds of reports for the state of Texas is The Texas Department of Transportation. Under the Texas Transportation Code §550.062, any law enforcement officer who investigates a motor vehicle crash that results in injury or the death of a person or damage to the property of $1,000 and more, must submit a written report of the crash to the Texas Department of Transportation not later than the 10th day after the date of the accident.\n\nThese reports which are very important in order to file a claim with your insurance agency, are also made available online, in a registry updated on an everyday basis with all the car accidents that occurred in the precinct. You can search the online police crash records by location, like an Austin police accident report or a Dallas police accident report, or with the knowledge of the car model, the manufacturing year or the date the accident occurred. \n\n\n\n#4 Collect evidence and information\n\nIn order to prove that another driver caused property damage and injuries, collecting evidence and general information about the car accident are really important. Write down everything that is relevant and take photos of the crash scene, vehicle registrations, and every important detail if possible. This way you make sure that other people involved in the accident won’t change their story in the latter stages. \n\n#5 Notify your insurance company \n\nDon’t waste time and reach out to your insurance company as soon as you can. You already have a vehicle insurance policy which practically is a contract between you and your insurance company. One of your obligations out of the insurance policy is to notify the company right after the accident, regardless of who caused it. This way the company will be able to provide better protection for you if the other driver decides to file a claim against you. \n\n#6 Reach out to a car accident attorney \n\nWhat happens if the accident settlement falls short of covering your injuries and damages or your insurance claim is denied? You reach out to a highly-skilled car accident attorney to help you with your case. Even for the initial consultation, make sure you bring copies of your medical records and bills, car crash reports, photos, statements of witnesses and every other relevant piece of information or evidence related to the accident. The attorney will review your case and afterward will let you know about the potential value of your claim, or if they believe that the claim will settle or if the claim could be tried in court.", "pred_label": "__label__1", "pred_score_pos": 0.8793094754219055} {"content": "GDPR... Big Challenge or New Opportunity?\n\nUtopia Marketing | February 13, 2018 | 2 min read\n\n\nAs the May 25, 2018 deadline approaches, organizations are looking to outside agencies, data protection experts and legal counsels to determine what needs to be done. Penalties for non-compliance can range from 2% annual revenue (or €10 million) to 4% annual revenue (or €20 million) depending on the severity of the violation, which are large enough to gain the attention of almost any organization.\n\nUnder GDPR, individuals are granted the right to see that their data is being processed lawfully and companies must demonstrate that accountability on an on-going basis. This process of GDPR compliance requires organizations to manage all elements of the data lifecycle including a long-term data governance strategy and deletion of personal data at the end of purpose (EoP). This means that if there is no longer a legitimate purpose that requires the use of personal data, it must be deleted. When deleting data, all objects related to that data set must be deleted as well.\n\n\nTypically, GDPR compliance involves significant effort, and cost, for your organization, and not just for implementation, but there can also be concerns around resources needed to sustain it throughout the years. As you are preparing for GDPR, the challenges to becoming truly compliant can be daunting… but we encourage you to embrace the opportunity it creates to build a new framework for data processes and improve the long-term governance of your data assets.  \n", "pred_label": "__label__1", "pred_score_pos": 0.9677263498306274} {"content": "Progression to secondary school, male (%) in Costa Rica was reported at 93.05 % in 2017, according to the World Bank collection of development indicators, compiled from officially recognized sources. Costa Rica - Progression to secondary school, male - actual values, historical data, forecasts and projections were sourced from the World Bank on March of 2021.\n\n\n\nPlease Paste this Code in your Website\n costa rica progression to secondary school male percent wb data\n\nProgression to secondary school refers to the number of new entrants to the first grade of secondary school in a given year as a percentage of the number of students enrolled in the final grade of primary school in the previous year (minus the number of repeaters from the last grade of primary education in the given year).\n\nCosta Rica | World Bank Development Indicators", "pred_label": "__label__1", "pred_score_pos": 0.9999682307243347} {"content": "Artist’s Statement\n\nI feel that my role as an artist is to create paintings that evoke strong feelings and emotions. Abstract art has the potential to be powerful enough to accomplish this. I have always loved color, and my art gives me the means to explore texture, shapes, and color. During the painting process, I let the paint and mood lead me to the next step as I strive to connect with the viewer. I often use products that allow me to create paintings that have an almost sculptural effect. Painting is an integral part of my life and makes each day an exciting adventure.\n\n\n\nArtists Incorporated Gallery; Vestavia, Alabama\nArtists Incorporated Market at the Shops of Grand River; Leeds, Alabama\n\nMary-Jean is a founder and co-owner of Artists Incorporated Gallery\nin Vestavia Hills, Alabama.", "pred_label": "__label__1", "pred_score_pos": 1.0000077486038208} {"content": "Plant diversity drives global patterns of insect invasions\n\nLiebhold, Andrew M. ; Yamanaka, Takehiko ; Roques, Alain ; Augustin, Sylvie ; Chown, Steven L. ; Brockerhoff, Eckehard G. ; Pysek, Petr (2018)\n\nCITATION: Liebhold, A. M., et al. 2018. Plant diversity drives global patterns of insect invasions. Scientific Reports, 8:8448, doi:10.1038/s41598-018-30605-4.\n\nThe original publication is available at\n\n\nDuring the last two centuries, thousands of insect species have been transported (largely inadvertently) and established outside of their native ranges worldwide, some with catastrophic ecological and economic impacts. Global variation in numbers of invading species depends on geographic variation in propagule pressure and heterogeneity of environmental resistance to invasions. Elton’s diversity-invasibility hypothesis, proposed over sixty years ago, has been widely explored for plants but little is known on how biodiversity affects insect invasions. Here we use species inventories from 44 land areas, ranging from small oceanic islands to entire continents in various world regions, to show that numbers of established insect species are primarily driven by diversity of plants, with both native and non-native plant species richness being the strongest predictor of insect invasions. We find that at large spatial scales, plant diversity directly explains variation in non-native insect species richness among world regions, while geographic factors such as land area, climate and insularity largely affect insect invasions indirectly via their effects on local plant richness.\n\nThis item appears in the following collections:", "pred_label": "__label__1", "pred_score_pos": 0.9998440742492676} {"content": "Distance from USA\n\nWashington to Oklahoma distance\n\nThe driving distance or the travel distance from Washington to Oklahoma is 2014.8 Miles. The straight line distance from Washington to Oklahoma is 1500.1 Miles. The kilometer based traveling distance is 3242.474 KM and the KM based straight line distance is 2414.1 KM.\n\nWashington location and Oklahoma location\n\nWashington is located at the latitude of 47.7508838 and the longitude of -120.7419411. Washington is situated at the latitude of 35.0078063 and the longitude of -97.0891904. The traveling source point address is Washington, USA. The destination travel point address is Oklahoma, USA.\n\nWashington to Oklahoma travel time\n\nThe travel time between Washington and Oklahoma is 28.79 hours. We assumed that you are traveling at the speed of 60km per hour from Washington to Oklahoma. The given travel time between Washington to Oklahoma may vary based on the travel route, speed and consistent traveling.\n\nWashington location and Oklahoma fuel cost\n\nThe Fuel cost( Gas cost , Petrol cost) to travel from Washington location to Oklahoma is 270.21 USD. The given fuel cost may vary based on the fuel consumption of your vehicle and varying price of the fuel. ;\n\nWashington travel distance calculator\n\nYou are welcome to find the travel distance calculation from washington You are viewing the page distance from washington to oklahoma. This page may provide answer for the following queries. what is the distance between Washington to Oklahoma ?. How far is Washington from Oklahoma ?. How many kilometers between Washington and Oklahoma ?. What is the travel time between Washington and Oklahoma. How long will it take to reach Oklahoma from Washington?. What is the geographical coordinates of Washington and Oklahoma?. The given driving distance from Oklahoma to Washington may vary based on various route.", "pred_label": "__label__1", "pred_score_pos": 0.7087655663490295} {"content": "Design (Un)Certainty and Decision Trees\n\nBilly Vaughn Koen, in The Discussion of The Method: Conducting the Engineer’s Approach to Problem Solving, says, “the absolute value of a heuristic is not established by conflict, but depends upon its usefulness in a specific context.”\n\nHeuristics often compete and conflict with each other. Frequently I use examples I find in presentations or blog posts to illustrate this point.\n\nFor example, I took this photo of a presentation by Michiel Overeem at DDD Europe where he surveyed various approaches people employed to update event stores and their event schemas.\n\nFive different alternatives for updating event stores\n\nFive different alternatives for updating event stores\n\nEvent stores are often used (not exclusively) in event-sourced architectures, where instead of storing data in traditional databases, changes to application state are stored as a sequence of events in event stores. For an introduction to event sourced architectures see Martin Fowler’s article. An event store is comprised of a collection of uniquely identified event streams which contain collections of events. Events are typed, uniquely identified and contain a set of attribute/value pairs.\n\nMichiel found five different ways designers addressed schema updates, each with different tradeoffs and constraints. The numbers across the top of the slide indicate the number of times each approached was used across 24 different people surveyed. Several used more than one approach (if you add up the x/24 count at the top of the slide there are more than 24 updates). Simply because you successfully updated your event store using one approach doesn’t mean you must do it the same way the next time. It is up to us as designers to sort things out and decide what to do next based on the current context. The nature of the schema change, the amount of data to be updated, the sensitivity of that data, and the amount of traffic that runs through apps that use the data all play into deciding which approach or approaches to take.\n\nThe “Weak schema” approach allows for additional data to be passed in an event record. The “upcaster” approach transforms incoming event data into the new format. The “copy transform” approach makes a copy and then updates that copy. Michiel found that these were the most common. “Versioned events” and “In-Place” updates were infrequently applied.\n\nI always want to know more about what drives designers to choose a particular heuristic over another. So I was happy to read the research paper Michiel and colleagues wrote for SANER 2017(the International Conference on Software Analysis, Evolution and Reengineering) appropriately titled The Dark Side of Event Sourcing: Managing Data Conversion. Their paper, which gives a fuller treatment of options for updating event stores and their data schemas, can be found here. In the paper they characterized updates as being either basic (simple) or complex. Updates could be made to events, event streams, or the event store itself.\n\nBasic event updates included adding or deleting an attribute, or changing the name or value of an attribute. Complex event updates included merging or splitting attributes.\n\nBasic stream update operations were adding, deleting, or renaming events. Complex Stream updates involved merging or splitting events, or moving attributes between events.\n\nBasic store updates were adding, deleting or renaming a stream. Complex store updates were merging and splitting streams or moving an event from one stream to another.\n\nAn example of a simple event update might be deleting a discountCode attribute. An example of a complex event update might be splitting an address attribute into various subparts (street, number, etc.).\n\nImportantly, their paper offered a decision framework for selecting an appropriate update strategy which walks through a set of decisions leading to approaches for updating the data, the applications that use that data, or both. I’ve recreated the decision tree they used to summarize their framework below:\n\nDecision Tree for Upgrading an Event Store System from The Dark Side of Event Sourcing: Managing Data Conversion\n\n\nThe authors also tested out their decision framework with three experts. Those experts noted that in their experiences they found complex schema updates to be rare. Hmm, does that mean that half of the decision tree isn’t very useful?\n\nAlso, they offered that instead of updating event schema they could instead use compensating techniques to accomplish similar results. For example, they might write code to create a new projection used by queries which contained an event attribute split into subparts—no need to update the event itself. Should the left half of their decision tree be expanded to include other compensating techniques (such as rewriting projection code logic)? Perhaps.\n\nAlso, the experts preferred copy or in-place transformations instead of approaches that involved writing and maintaining lots of conversion code. I wonder, did they do this even in the case of “basic” updates. If so, what led them to make this decision?\n\nDecision trees are a good way to capture design options. But they can also be deceptive about their coverage of the problem/solution space. A decision table is considered balanced or complete if it includes every possible combination of input variables. We programmers are used to writing precise, balanced decision structures in our code based on a complete set of parameters. But the “variables” that go into deciding what event schema update approach aren’t so well-defined.\n\nTo me, initially this decision framework seemed comprehensive. But on further reflection, I believe it could benefit from reflecting the heuristics used by more designers and maintainers of production event-sourced systems. While this framework was a good first cut, the decision tree for schema updates needs more details (and rework) to capture more factors that go into schema update design. I don’t know of an easy way to capture these heuristics except through interviews, conversations, and observing what people actually do (rather than what they say they prefer).\n\nFor example, none of the experts preferred event record versioning, and yet, if it were done carefully, maybe event versions would require less maintenance. Is there ever a good time for “converting” an old event version to a newer one? And, if you need to delete an attribute on an event because it is no longer available or relevant, what are the implications of deprecating, rather than deleting it? Should it always be the event consumers’ responsibility to infer values for missing (deleted) attributes? Or is it ever advantageous to create and pass along default values for deleted attributes?\n\nThis led me to consider the myriad heuristics that go into making any data schema change (not just for event records): Under what conditions is it better to do a quick, cheap, easy to implement update to a schema—for example deciding to pack on additional attributes, having a policy to never delete any?\n\nPeople in the database world have written much about gritty schema update approaches. While event stores are a relatively new technology, heuristics for data migration are not. But in order to benefit from these insights, we need to reach back in time and recover and repurpose these heuristics from those technologies to event stores.Those who build production event sourced architectures have likely done this or else they’ve had to learn some practical data schema evolution heuristics through experience (and trial and error). As Billy Vaughn Koen states, “If this context changes, the heuristic may become uninteresting and disappear from view awaiting, perhaps, a change of fortune in the future.” He wasn’t talking about software architecture and design heuristics per se, but he could have been.\n\nReconciling New Design Approaches with What You Already Know\n\n\nLast week at the deliver:Agile conference in Nashville I attended a talk by Autumn Crossman explaining the benefits of functional programming to us old timey object-oriented designers. I also attended the session led by Declan Whelan and Sean Button, on “Overcoming dys-functional programming. Leverage & transcend years of OO know-how with FP.”\n\nThe implication in both talks was that although objects have strengths, they are often abused and not powerful enough for some of today’s problems. And that now is an opportune time for us OO designers to make some changes to our preferred ways of working.\n\nYet I find myself asking: when should I step away from what I’ve been doing and know how to do well and step into a totally new design approach?\n\nNo doubt, functional programming is becoming more popular. But objects aren’t going away, either.\n\nThere are some benefits of pure functional solutions to certain design problems. Pure functional programming solutions don’t have side effects. You make stream-processing steps easily composable by designing little, single purpose functions operating over immutable data. You are mutating data, it just isn’t being mutated in place. In OO terms, you aren’t changing the internal state of objects, you are creating new objects with different internal state. By using map-reduce you can avoid loop/iteration/end-condition programming errors (letting powerful functions handle those details). No need to define variables and counters. This is already familiar to Smalltalk programmers via do:, collect:, select:, and inject:into: methods which operate on collections (Ruby has its equivalents, too). And by operating on immutable data, multi-threading and parallelization get easier.\n\nI get that.\n\nBut I can create immutable data using OO technology, too. Ever hear of the Value Object pattern? Long ago I learned to create designs that included both stateful and immutable objects. And to understand when it is appropriate to do so. I discovered and tweaked my heuristics for when it made sense to stream over immutable data and when to modify data in place. But in complex systems (or when you are new to libraries) it can be difficult to suss out what others are doing (or in the case of libraries, what they are forcing you to do).\n\nBut that’s not the point, really. The point is, once you understand how to use any technique, as you gain proficiency, you learn when and where to exploit it.\n\nBut is pure functional programming really, finally the panacea we’ve all been looking for? Or is it just another powerful tool in our toolkit? How powerful is it? Where is it best applied?\n\nI’m still working through my answers to these questions. My answers will most likely differ from yours (after all, your design context and experience is different). That’s OK.\n\nWhenever we encounter new approaches we need to reconcile them with our current preferred ways of designing. We may find ourselves going against the grain of popular trends or going with the flow. Whatever. We shouldn’t be afraid of trying something new.\n\nYet we also shouldn’t too easily discount and discard approaches that have worked in the past (and that still work under many conditions). Or, worse yet, we shouldn’t feel anxious that the expertise we’ve acquired is dated or that our expertise can’t be transferred to new technologies and design approaches. We can learn. We can adapt. And, yet, we don’t have to throw out everything we know in order to become proficient in other design approaches. But we do have to have an open mind.\n\nWe also shouldn’t be seduced by promises of “silver bullets.” Be aware that evangelists, enthusiasts, and entrepreneur frequently oversell the utility of technologies. To get us to adopt something new, they often encourage us to discard what has worked for us in the past.\n\nWhile I like some aspects of functional programming, I see the value in multi-paradigm programming languages. I’m not a purist. Recently I’ve written some machine learning algorithms in Python for some Coursera courses I’ve taken. During that exercise, I rediscovered that powerful libraries make up for the shortcomings and quirks of any programming language. I still think Python has its fair share of quirks.\n\nAnd while some consider Python to support functional programming, it isn’t a pure functional language. It takes that middle ground, as one stack overflow writer observes:\n\n“And it should be noted that the “FP-ness” of a language isn’t binary, it’s on a continuum. Python doesn’t have built in support for efficient manipulation of immutable structures as far as I know. That’s one large knock against it, as immutability can be considered a strong aspect of FP. It also doesn’t support tail-call optimization, which can be a problem when dealing with recursive solutions. As you mentioned though, it does have first-class functions, and built-in support for some idioms, such as map/comprehensions/generator expressions, reduce and lazy processing of data.”\n\nPython’s a multi-paradigm language with incredible support for matrix operations and a wealth of open machine learning open source libraries.\n\nI haven’t had an opportunity to dial-up the knobs and solve larger design problems in a pure functional style. I hope to do so soon. My current thinking about a pure functional style of programming is that it works well for streaming over large volumes of data. I’m not sure how it helps support quirky, ever-changing business rules and lots of behavioral variations based on system state. Reconciling my “go to” design approaches with new ways of working takes some mental lifting and initial discomfort. But when I do take the time to new design approaches, I have no doubt that I’ll find some new heuristics, polish existing ones and learn more about design in the process.\n\nWhat we say versus what we do\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nNothing ever goes exactly by the book\n\n\n\n\n\nAnd here’s a photo of the dish as I prepared it:\n\n\n\n\n\nWriting, Remembering, and Sharing Design Heuristics\n\n\n\n1. Writing helps us remember the important bits\n\n2. Writing in longhand helps us process our experiences\n\n\n3. Written heuristics can be shared\n\n\nA Simple Idea- QHE Cards\n\nAnnotatedQHECard2019_04_12 2_03 PM Office Lens~2 (1)\n\n\n\n\n\n\n\nMultiple Events for a Single Process\n\nSummary of Problem\n\nSummary of Solution\n\n\n\nWhat do typical design heuristics look like?\n\n\n\n\n\n\n\n • Pattern: Do a Mock Installation\n • Difficulties:\n • Solving this is feasible because:\n • Maybe the system includes some kind of self-test\n • After the build prepare a report:\n • Version number of libraries, frameworks and patches used\n • Dependencies between the infrastructure\n • Problems you encountered and how you tried to solve them\n • Suggestions for improvement\n • Tradeoffs:\n • Pros:\n • It is an essential prerequisite\n • Demands precision\n • Increases your credibility\n • Cons:\n • Tedious activity\n • No certainty\n • Difficulties: Easy to get carried away.\n\n\n\n\nGrowing Your Personal Design Heuristics Toolkit\n\n\n\n\n\nCourtesy of\n\nCourtesy of\n\nBilly describes three different type of heuristics:\n\n 1. Heuristics we use to solve a specific problem;\n\nLet’s take a closer look at each type.\n\n\n\n\n\n\nFirst contact design pattern language\n\n\n\n\nWhat’s going on here?\n\nQuestion: What is more exasperating than reading design documentation that doesn’t synch up with the code?\nOne answer: Writing such useless design documentation.\nAnother answer: Writing documents that don’t stand a chance of being aligned with the code.\nMy answer: Reading design documentation that is at the wrong level of abstraction or detail to help me do the task at hand.\n\nCourtesy xkcd\n\nA few years ago I worked with someone, who, when asked for a high level overview of some complex bits of code we were going to refactor, produced a detailed Visio diagram that went on for 40+ pages! In that document were statements directly lifted from his code. The intent was to represent the control logic and branching structure of some very complicated algorithms (he copied conditional statements into decision diamonds and copied code that performed steps of the algorithm directly into action blocks). To him, the exercise of creating this documentation had really clarified his design. I was amazed he went to such an effort. To me, the control structure was evident by simply reading the code. Moreover, what I was looking for, and obviously didn’t communicate very well, was that I would appreciate some discussion at a higher level, explaining what algorithm variations there were and how code and data were structured in order to handle myriad typical and special cases.\n\nI wanted to be oriented to the code and data and parts that were configurable and parameterized.\n\nLater, I learned from one of his colleagues that “Bob” always explained things in great detail and wasn’t very good at “boiling things down.” If you wanted to ask “Bob” a question about the code you’d better plan on at least spending half an hour with him.\n\nAnother time a colleague created a sequence diagram explaining how data was created that was used by a nightly cron job. What was missing was any description of what that cron job did. Maybe it was so obvious to him that he didn’t think it was important. But I lacked the context to get the full picture. So I had to dig into the cron job script to understand what was really going on.\n\nWhen I want to get oriented to a large body of code, I like to see a depiction of how it is structured and organized and the major responsibilities of each significant part. Not the package or file structure (that will be useful, eventually), but how it is organized into significant modules, functions, classes and/or call structures. I want to know what the major parts of the system are and why they are there and relationships between them. And at a high level, how they interact. And then I want to understand key aspects of the system dynamics. Just by staring at code I’ll never fathom all the ins and outs of its execution model (e.g. what threads or processes there are, what important information is consumed, produced, or passed around).\n\nSimon Brown gave a talk at XP2016 on The Art of Visualizing Software Architecture. Simon travels the world giving advice and training and talks at conferences about how to do this. He has also build a tool called Structerizr which:\n\n“ blend[s] together the best parts of the various approaches and allow software developers to easily create software architecture diagrams that remain up to date when the code changes. Structurizr allows you to take a hybrid “extract and supplement” approach. It provides you with a way to create software architecture models using code. This means you can extract information from your code using static analysis and reflection, supplementing the model where information isn’t readily available. The resulting diagrams can be visualized and shared via the web.”\n\nI had the opportunity to spend an hour with Simon getting a personalized demo of Structurizr, and discussing the ins and outs of his tool works, how it has been used, and some aspirations for the future.\n\nI was initially surprised about how you specify what your “model elements and relationships” are: you write code specifications for this. To me, it seemed that this could have more easily be accomplished by writing some parseable external description or using a diagramming tool which enabled me to link to the relevant code.\n\nHowever, I know why Simon’s made this choice: He deeply believes that code should be the reference point for all structural architecture information. So he thinks it a natural extension that developers write a bit more code to specify the important elements of the models they want to see and how to depict them. To Simon, it isn’t sensical to just “add an element” to a diagram unless there is some attachment to actual code. For example, you may define a Hibernate specification to represent data access to a repository. Then that can be specified as a data source. With external descriptions that are not based on code, you have a greater chance of it becoming disconnected from what code actually does. So be it. This is where my values diverge a bit from Simon’s. I favor a richer or higher level documentation that isn’t code based if it tells me something I need to know to do a task (or something I shouldn’t do) or that gives me insights that I wouldn’t find otherwise. I also like the freedom to embellish my diagrams with extra annotations, colors, highlights, etc., etc. so I can focus viewers’ attention. And consequently, I also like to create a key that describes the elements of any diagram so casual readers can understand my notation, too.\n\nAfter processing these model descriptions, Structurizr spits out JSON descriptions that represent aspects of a C4 model: Context, Containers, Components, and Class diagrams. These are then submitted to a service, which then create various model visualizations that can directly link to parts of your code source. There’s also a rudimentary ability to add additional bits of information to textually describe your architecture and architecture requirements. I’m glad that, recognizing the limits of what code can tell about architecture, the tool provides an easy entry way into developers telling more about the architecture in text.\n\nIn our conversation, Simon emphasized that one important benefit of linking architecture document to code is that it never gets out of synch. The code for your architecture documentation can be versioned, right along with your production code.\n\nFair enough. Useful even. But how helpful is the documentation that is generated in understanding what’s going on in your system?\n\nI think this is one way (certainly not the only way, however) to provide an orientation into the overall structure of your system and major relationships between its parts. But there are definite limits to what you can describe by models generated from static analysis of code. Such models don’t tell me the responsibilities of a component. I have to glean that from supplementary text (which I didn’t see an easy way to attach to the model descriptions) or to abstract that by reading code. And they certainly won’t explain any dynamic system behavior or system qualities.\n\nWhile I find Structurizr’s direct connection to the code intriguing, it is also its biggest limitation. Structurizr is intended to be used by developers who want to create some architecture documentation, which stays in synch with their code and that also can be shared via websites or wikis or embedding it into other documents.\n\nStructurizr has succeeded with this fairly modest goal: assist developers who don’t ordinarily generate any useful architecture diagrams whatsoever to do something.\n\nBut this isn’t enough. As designers or architects, only you can tell me answers to my larger questions about why your code is structured the way it is, and what are the important bits about the system and runtime execution that are intentional and crucial to understand and preserve. No diagram generated by a tool will ever replace your insights and wisdom. No amount of code comments can convey all that either. I need to hear (and read) and see more of this kind of stuff from you.\n\nBeing Agile About Documenting and Communicating Architecture\n\nSoftware architects and developers often need to defend, critique, define, or explain many different aspects of the design a complex system. Yet agile teams favor direct communications over documentation. Do we still need to document our designs?\n\nOf course we do.\n\nWe won’t always be around to directly communicate our design to all current and future stakeholders. Personally, I’ve never found working code (or tests) to be the best expression of a software design. Tests express expectations about observable system behavior (not about the design choices we made in implementing that behavior). And the code doesn’t capture what we were thinking at the time we wrote that code or the ideas we considered and discarded as we got that code fully functioning. Neither tests nor code capture all our constraints and working assumptions or our hopes and aspirations for that code.\n\nSo what kind of design documentation should we create and how much documentation should we create, for whom, and when? And what is “good” enough documentation?\nEoin Woods gave a talk at XP 2016 titled, “Capturing Design (When You Really Have To)” that got me to revisit my own beliefs on the topic and to think about the state of the current agile practices on documenting architecture.\n\nOne take away from Eoin’s talk is to consider the primary purpose of any design description: is it primarily to immediately communicate or to be a long-term record? If your primary goal is to communicate on the fly, then Eoin claims that your documentation should be short lived, tailored to your audience, throwaway, and informal. On the other hand, design descriptions as records are likely to be long-lived, preserve information, be maintainable and organized, and more formal (or well-defined).\n\nSince we are charged to deliver value with our working software, it is often hard to pay attention to any perceived efforts at “slowing down” to describe our systems as we build them. But if we’re building software that is expected to live long (and prosper), it makes sense to invest in documenting some aspects of that system—if nothing more to serve as breadcrumbs useful to those working on the system in the future or to our future selves.\n\nSo what can we do to keep design descriptions useful, relevant, unambiguous, and up-to-date? Eoin argues that to be palatable to agile projects, design documentation should be minimal, useful, and significant. It should explain what is important about the design and why it is important; what design decisions we made (and when), and what are the major system pieces, their responsibilities and key interactions. Because of my Responsibility-Driven Design values and roots, I like that he considers system elements and their responsibilities as being minimally useful information descriptions of a system. But to me this just a starting point to get an initial sense of what a system is and does and does not do. There certainly is room for more description, and more details when warranted.\n\nAnd that gets us back to pragmatics. A design description isn’t the first thing that developers think of doing (not everyone is a visual thinker nor a writer). I know I’m atypical because, early in my engineering career, I enjoyed spending 3 weeks writing a document on my universal linker worked and how to extend it and its limitations. I was nearly as happy producing that document as I was in designing and implementing that linker. It pleased me that sustaining engineering found that document useful years after I had left for another job.\n\nSo for the rest of you who don’t find it natural to create documentation, here’s some advice from Eoin:\n\n • Do it sprint-by-sprint (or little by little). Don’t do it all at once.\n • Be aware of tradeoffs between fidelity and maintainability. The more precise it is, the harder descriptions will be to keep up to date.\n • Know the precision needed by your document’s users. If they need details, they need details. The more details, the more effort required to keep them up to date.\n • Consider linking design descriptions to your code (more on that in another blog post)\n • Create a “commons” where design descriptions are accessible and shared\n • Focus on the “gaps”—describe things that are poorly understood\n • Always ask what’s good enough. Don’t settle for less when more is needed or more when less is needed.\n\nTo this list I would add: if design descriptions are important to your company and your product or project, make it known. Explain why design documentation is important, respond to questions and challenges of that commitment, and then give people the support they need to create these kinds of descriptions. Let them perform experiments and build consensus around what is needed.\n\nBe creative and incremental. One company I know made short video recordings of designers and architects giving short talks about why things worked the way they did. They were really short—five minutes or less. Another team created lightweight architecture documentation as they enhanced and made architectural improvements to the 300+ working applications they had to support. It was essential for them that there be more than just the code as the knowledge about these systems was getting lost and decaying over time. Rather than throw up their hands and give up, they just created enough design documentation using simple templates and only as new initiatives were started.\n\nFind a willing documenter. Sometimes a new person (who is new to the system and to the company) is a good person to pair with another old hand to create a high-level description of the system as part of “getting their feet wet.” But don’t just stick them with the documentation. Have them write code and tests, too. From the start.\n\nIt’s Not That Simple: The Interplay Between Fast and Slow Thinking\n\n\n • Stay calm, focused, and alert; and\n\n\n\n\n\nWe don’t get to choose which form of thinking we use.\n", "pred_label": "__label__1", "pred_score_pos": 0.9260784387588501} {"content": "Quick Answer: What Is BPO Shrinkage?\n\nWhat is AHT formula?\n\nTo calculate average handle time, add total talk time with total hold time, then add ACW.\n\nLastly, divide that by the total number of calls to get the AHT.\n\nCalculating AHT.\n\n\nWhat is Utilisation in BPO?\n\nCall center agent utilization is the percentage of time an agent spends on handling contacts and customer interactions or handling contact-related work. It measures how much time agents who are logged into the queue spend handling customers and how much time they are being paid to work in the call center.\n\nWhat is employee shrinkage?\n\n\nHow can we prevent shrinkage in BPO?\n\nHere are four tips to handle shrinkage and blunt its negative impacts.Track it. To track schedule adherence, many call centers deploy employee tracking applications that let users log in and out as they start and end their shift, respectively. … Monitor absenteeism.Keep employees engaged. … Reward productive agents.\n\nWhat is Excel shrinkage?\n\nIn retail terms, shrinkage refers to a company’s percent loss resulting from damage, product expiration and theft of unsold products. … You can calculate retail shrinkage in Excel by dividing the value of goods lost to shrinkage by the total value of goods that are supposed to be in the inventory.\n\nWhat is a good shrink percentage?\n\nThe average shrink rate – your shrink amount defined as a percentage of your sales – was 1.44 percent nationally, but almost one in four retailers reported a shrink of 2 percent or higher.\n\nWhat is the meaning of shrinkage in BPO?\n\nShrinkage is a term that is broadly defined as the percentage of time that scheduled agents are not available to handle customer interactions. … Shrinkage can encompass planned events, such as breaks, paid time off, training, team meetings, coaching sessions, or other activities.\n\nHow do you control shrinkage?\n\nUnderstanding how shrinkage happens in retail stores is the first step in reducing and preventing it.Shoplifting. … Employee Theft. … Administrative Errors. … Fraud. … Operational Loss. … Implement Checks and Balances. … Install Obvious Surveillance and Anti-Theft Signage. … Use Anti-Shoplifting Devices: Security Tags.More items…•\n\nWhat is KPI in BPO?\n\nIntroduction to Key Performance Indicators (KPIs) Key performance indicators is the term for a type of performance metric used to evaluate how a company is progressing towards their business goals. It is one of the efforts businesses use to measure productivity using trackable numbers.\n\nWhat is shrinkage factor?\n\nPercentage by which an output falls short of the estimated or planned output. Percentage of the total inventory by which a loss due to counting or recording errors, or from pilferage, spoilage, theft, or wastage occurs.\n\nHow do you calculate shrinkage?\n\nDivide the amount of shrinkage by the original size to find the shrinkage rate. In the example, divide 2 by 8 to get 0.25. Multiply the shrinkage rate by 100 to find the shrinkage as a percentage. In the example, multiply 0.25 by 100 to get 25 percent.\n\nWhat is shrinkage percentage in call center?\n\n\nHow is occupancy calculated in BPO?\n\nCalculating Occupancy This is called the “total handling time”. … Once the contact centre has calculated these figures, it can then simply divide the number calculated for “total handling time” by the figure calculated for “total logged time” and multiply the result by 100, to find a percentage occupancy.\n\nWhat are the 3 main causes of shrink?\n\nThere are three main sources of inventory shrinkage in retail:Shoplifting. The number one source of shrinkage for a retail business is, perhaps unsurprisingly theft by consumers themselves. … Internal/employee theft. … Paperwork errors.", "pred_label": "__label__1", "pred_score_pos": 0.9999557733535767} {"content": "How wireless earphones have evolved over time\n\nOct 03, 2020, 05:00 AM\n\nHow wireless earphones improved over time and the changes that they brought with them.\n\nWireless earphones have become a big thing now. But how did that happen? In this episode of Our Own Devices, Host Nandagopal Rajan and veteran tech journalist Nimish Dubey talk about how these earphones have evolved and improved over time, the changes they have brought with them and whether they have helped usher in the era of voice assistants.", "pred_label": "__label__1", "pred_score_pos": 0.9185996055603027} {"content": "URIAH HEEP's MICK BOX On Hypothetical ROCK AND ROLL HALL OF FAME Induction: 'If It Happens, It Happens'\n\n\nIn a new interview with Meltdown of Detroit's WRIF radio station, URIAH HEEP guitarist Mick Box was asked why his band has not yet been inducted into the Rock And Roll Hall Of Fame. He responded: \"Funny enough, we did a European tour with THE ZOMBIES supporting us. And then they got nominated, and they got in the Hall Of Fame. So I don't think there's any particular rules. I think they've got their own agenda, and I think they only choose a small amount of people each year. Our industry is full of people that deserve to be there, and it's nice that people include us in that deserving place. But if it happens, it happens; and if it doesn't, we'll carry on with life. But if we do get in the Hall Of Fame, it will just be a tick in the box that we'll be very proud of getting there. But you can't rely on it; as I say, they've got their own agenda. And if we do get chosen, then we'll be very happy puppies.\"\n\nURIAH HEEP's 25th studio album, \"Living The Dream\", was released in September 2018 via Frontiers Music Srl. The disc was helmed by the widely respected Canadian producer Jay Ruston, known for his work with STONE SOUR, ANTHRAX and STEEL PANTHER.\n\n\n\nAlong with LED ZEPPELIN, BLACK SABBATH and DEEP PURPLE, URIAH HEEP helped invent a decorative and uniquely British form of heavy metal with \"Very 'Eavy, Very 'Umble\", offered as a self-titled on American shores, but whatever the titling, historically massive in the invention of a music format that would rule the '70s and only intensify in the '80s.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.991002082824707} {"content": "Girls Varsity Basketball · Life is better like this!\n\nNo problem\n\nSome people hold you to higher standards than they do themselves. They expect you to be responsible for all of your choices but conveniently avoid responsibility for theirs. They demand responsibility for the impact of your behavior and fail to keep the same expectation of their own action.\n\nThis isn’t ideal, but it’s not a problem. Not for you. You know better.\n\nBecause someone else’s inconsistencies, judgments, or hypocrisies are not a barrier to you taking responsibility for yourself, your choices, and the consequences of your action. You don’t control anyone but yourself and you understand that. So you focus on the one thing you control and you take responsibility for that at the highest level. And you never, ever expect from someone else what you don’t apply to yourself with integrity and discipline.\n\nDiscipline is the shortcut. Do the work.", "pred_label": "__label__1", "pred_score_pos": 0.5679919123649597} {"content": "Quick Answer: How Many Sides Does A Circle Have?\n\nDoes a circle have 0 or 1 side?\n\nHow many sides does a circle have.\n\nA circle has zero sides.\n\nA side is a line segment.\n\nEvery point in a line segment is colinear..\n\nDoes circle have side?\n\nThis is a simple, easily understandable phrase that perfectly captures the sides of a square. We have failed to find a satisfactory generalisation of this to curved figures, so the best thing to do is stick with the original. And a circle doesn’t have any. For no sides: true, according to a sensible notion of “side”.\n\nDoes a circle have an angle?\n\nLet’s see it below.An angle of a circle is an angle which is formed between the radii, chords or tangents of a circle. We saw different types of angles in the “Angles” section, but in the case of a circle, there, basically, are four types of angles. These are: central, inscribed, interior, and exterior angles.\n\nWhat do you call a shape with infinite sides?\n\nApeirogonsIn geometry, an apeirogon (from the Greek words “ἄπειρος” apeiros: “infinite, boundless”, and “γωνία” gonia: “angle”) or infinite polygon is a generalized polygon with a countably infinite number of sides. Apeirogons are the two-dimensional case of infinite polytopes.\n\nWhat is a circle kindergarten?\n\nA circle is a shape that is made up of a curved line. It’s round, and all points on the curved line are an equal distance from the center point. This shape is two-dimensional, which means it’s flat.\n\nDoes a circle have 360 sides?\n\nFor your circle, you’ve got an infinite number of “corners” but the angle you turn at each one is infinitesimally small so it still works. They are both in a two dimensional plane. … Draw a cross in the middle of a circle and you have 4 sides of 90 degrees, which equals 360.\n\nWhat describes a circle?\n\n\nHow many sides does a circle have kindergarten?\n\n\nWhat is a shape with 1 side called?\n\n1 side. monogon (impossible figure in Euclidean geometry) 2 sides. digon. 3 sides.\n\nDoes a circle have 2 sides?\n\n\nWhy is circle a 2d shape?\n\n2D shapes A 2D shape is a flat shape. We are learning about the following 2D shapes – circle, square, rectangle, triangle, pentagon, hexagon, octagon. … E.g. a triangle has 3 straight sides and 3 corners, whereas a circle has 1 curved side but no corners. 3D shapes A 3D shape is a blown up shape.\n\nDoes a sphere have infinite sides?\n\nA sphere is not a polyhedron. A polyhedron has a finite number of faces, each face being a polygon belonging to a plane. A sphere does not have any faces. … So, no, a sphere is not an infinite sided shape, but you can approximate it as closely as you like by taking polyhedra with sufficiently many faces.\n\nDoes a circle have a face?\n\nBecause a circle is a flat, plane shape, it is a face. But because it is round around the outside, it does not form any edges or vertices. A cylinder has two circular faces but also no edges or vertices.\n\nHow many sides does a circle have grade 1?\n\nIn our primary education resources, we say that a circle has one curved side. However, it is also possible to challenge older children with the concept that a circle has an infinite amount of straight sides.\n\nHow many sides has a circle?\n\n2 sidesTo answer this riddle, a circle has 2 sides.\n\nWhy does a circle have 0 sides?\n\n\nDoes a circle have infinite corners?\n\nDoes a circle have 0 corners or infinite corners? A circle has zero corners. Even though the limit of an n-sided polygon as n approaches infinity is a circle, a circle itself has no corners. … In order for a circle to have infinitely many sides, a side of length (a point) must count as a side.\n\nWhat is the edge of a circle?\n\nUnder this definition a circle has one edge – the entire boundary. A semicircle would have two edges: the curved portion, and the diameter.\n\nDoes a circle have vertices?\n\n0Circle/Number of vertices", "pred_label": "__label__1", "pred_score_pos": 0.99112868309021} {"content": "The synthesis and in vitro anticancer activity of dihalo(η6-p-cymene)(3,5,6-bicyclophosphite-α-D-glucofuranoside)ruthenium(II) complexes are described. The compds. were characterized by NMR spectroscopy and ESI mass spectrometry, and the mol. structures of dichlorido-, dibromido- and diiodido(η6-p-cymene)(3,5,6-bicyclophosphite-1,2-O-isopropylidene-α-D-glucofuranoside)ruthenium(II) were detd. by X- ray diffraction anal. The complexes were shown to undergo aquation of the first halido ligand in aq. soln., followed by hydrolysis of a P-O bond of the phosphite ligand, and finally formation of dinuclear species. The hydrolysis mechanism was confirmed by DFT calcns. The aquation of the complexes was markedly suppressed in 100 mM NaCl soln., and notably only very slow hydrolysis of the P-O bond was obsd. The complexes showed affinity towards albumin and transferrin and monoadduct formation with 9-ethylguanine. In vitro studies revealed that the 3,5,6-bicyclophosphite-1,2-O-cyclohexylidene-α-D-glucofuranoside complex is the most cytotoxic compd. in human cancer cell lines (IC50 values from 30 to 300 μM depending on the cell line).", "pred_label": "__label__1", "pred_score_pos": 0.8213030099868774} {"content": "Hiking 101: The Complete Guide to Hiking for Beginners\n\nYou’ve got your hiking boots on, your worries left at home and a trail in front of you. You’re surrounded by dense nature, no sounds of buses or chatter, just the calming sounds of birds singing and a breeze whistling through the trees. You can feel the sun on your skin, you fill your lungs with perfectly fresh air and can smell the environment around you. All the while you feel warm and alive from this therapeutic, whole-body workout whilst you move through the natural world. Welcome to the world of hiking.\n\nHiking really is an incredible thing: medicine for the mind, body and soul. An activity you can do in almost any place around the world, for no cost and for pretty much any length of time. Besides the personal benefits, the time spent in the wilderness can also help people value and appreciate their surroundings, ultimately leading to more sustainable lifestyles. It’s something so good scientists, politicians, magazines and newspapers are constantly singing its praise.\n\nBasically, no matter who you are, where you live or what you do, hiking will be an incredible addition to your life, but sometimes it’s hard to know where to start.\n\nIn this guide to hiking for beginners you’ll learn…\n\nWhat is hiking?\nBenefits of hiking\nHow to plan and prepare for a hike (incl. picking the right hike and how to find the best trails)\nWhat to pack hiking\nWhat clothes to wear hiking\nHiking foods and water\nHiking safety tips\nWhat to do post-hike\nHow to stay green and respectful on the trail\n\n\nSimilar Posts:\n", "pred_label": "__label__1", "pred_score_pos": 0.9945784211158752} {"content": "Monday, March 01, 2021\n\nDivrei Torah - JewishLink\n\nRemote, Not Removed\n\nUnderstanding Yaakov Avinu’s frame of mind in Parshat Vayeitzei offers an enlightening insight as to how to best navigate in a time of ambiguity and grave uncertainty.\n\nThe last two pesukim of the parsha state:\n\n“And Yaakov went on his way, and angels of God\n\n\nHow the Avot Returned the World to Adam HaRishon Before the Sin\n\nIf we study the essence and lives of the three Avot, it can be suggested that they brought the world to a state of Adam HaRishon before the sin. Breaking down Adam’s sin, we find three elements: One a lack of heeding God’s command; second, a fall from kedusha; and third, a new existential battle between good and bad. When we look to the\n\n\nBigger, Better Picture\n\nYaakov is on the run from his big bro Eisav, and interestingly enough, this escape drama affects the way the text of the Torah looks. Typically, parshiyot have paragraph breaks, but Vayeitzei surprisingly has none. Baal Haturim quotes those who explain that the reason why the text of this week’s parsha is “closed” (meaning, there are\n\n\nFulfilling Our Birthright\n\nLast year, Parshas Toldos was the occasion of the pidyon haben (redeeming the firstborn) of the older of our twin grandsons. For my own family, this was a brand-new mitzvah, as our oldest children were twin girls. The firstborn rights play a prominent role in Parshas Toldos, where Yaakov purchases Eisav’s birthright.\n\n\nI Will Choose Free Will\n\nThe world of religious ideas was steadily coalescing. Gradually, God introduced humanity to fundamental principles of religion. The horrific flood demonstrated the rule of moral “cause and effect”: if humans descended into moral chaos, the world would literally collapse. Subsequently, the selection of Avraham confirmed that a\n\n\n‘Letz’ Think About It\n\n“These are the offsprings of Yitzchak the son of Avraham; Avraham bore Yitzchak.” If Yitzchak is the son of Avraham, it seems redundant to then say “Avraham bore Yitzchak.” The Siftei Chachamim based on the Gemara (Bava Metzia 87a) explains the back story. Upon Yitzchak’s birth [which was certainly a profound miracle that\n\n\nTranquil Triumphs\n\nThere is something to be said for revolutionaries. For founders. For the people who have the foresight and the daring to chart a course untrodden. Revolutionaries put their ideals to the test by living the principles they believe can transform the world around them, and history will always be enamored by such people. Avraham was a\n\n\nChancing to Find a Designated Shidduch\n\nIt was last year in the week of Parshas Chayei Sarah that my older brother, Binyamin, got married to Sarah Miriam Kaplan. Both had been single for many years and never married. They planned for a small wedding, with more friends coming for dancing and a buffet at the end. To their surprise, when they walked down the aisle, every seat was\n\n\nLiving With God\n\nAvraham’s revolution had begun to gain traction. He traversed the promised land, participating both in wars as well as in diplomacy, all the while disseminating awareness about a one God. Though his message radiated throughout the Land of Israel, it still hadn’t infiltrated cultures outside the land of God. His only previous\n\n\nHashem Will Provide\n\nI recently received a phone call from an out-of-town friend of mine. His young adult daughter had been dating a yeshiva-oriented young man and it looked as if this might lead to an engagement. The young man wanted to study Torah and possibly pursue a career in chinuch (teaching) after several years. However, he had given no serious thought\n\n\nBelonging to the Land\n\nParshat Chayei Sarah describes the first portion of land any Jew ever owned in Israel: Avraham’s purchase of the Machpeilah cave in Chevron as a burial plot for Sarah.\n\nWhy does our permanent and tangible connection with the Land of Israel begin as the purchase of a burial plot? Indeed, for thousands of\n\n\nNo Questions Asked\n\nEphron pulls the chair on Avraham, positing an exorbitant amount of cash for the plot of land Avraham wants to bury Sarah in. Avraham had not so much of a choice but to accept. One who reads through the exchange and puts himself in place of Avraham can imagine the possible frustration and annoyance involved, as well as the faintheartedness", "pred_label": "__label__1", "pred_score_pos": 0.5133758187294006} {"content": "Welcome to JOYCE DILORENZO.com\n\n\nCheck out my latest books\n\nAbout the Author\n\nJoyce was born in 1951, on the Indonesian Island of Java, in the village of Surabaya.  Her father and mother were of mixed Dutch and Indonesian descent, they are Eurasians.  After the Indonesian National Revolution, which followed World War II, her parents, forced to leave independent Indonesia, repatriated to the Netherlands.  \n\nWhen Joyce was five, her parents divorced, consequently, she and her younger sister; Ellen were raised by their mother and grandmother. At the age of ten, Joyce’s family immigrated to the United States to chase the American Dream. Her childhood was ideal, growing up in Redwood City; a friendly town located in Northern California’s San Francisco Bay Area.\n\nHaving journeyed with her family from Southeast Asia to Europe as a baby, before settling in the United States of America as a teenager, Joyce has a penchant for traveling, accordingly it has always been a part of her life. Her first unchaperoned trip, was one year after high school graduation. It felt sensational to spread her wings, discover her own travel style and explore different traditions and cultures at her own pace. At first, her travels were limited to visiting family in the Netherlands, however, as she gained confidence and experience, her adventures included trips to Hawaii, Mexico, Canada, Great Britain and several western European countries.\n\nIn 1986, Joyce met her Prince. Vincent Joseph Di Lorenzo was the most handsome man she had ever met. Vince introduced her to sailing and before long he brought her to the tropical British Virgin Islands on an unforgettable sailing expedition. Almost simultaneously, Joyce fell in love with Vince and their new spirited way of traveling. They were married on October 1, 1988, in the enchanting bayside village of Sausalito.\n\nVince and Joyce made their first trip to Italy in 1990, where Vince discovered his connection to the country of his heritage. They embraced the Italian lifestyle that seemed to grab hold of their hearts. Now they divide their time between their home in San Carlos; an idyllic suburb of San Francisco and their home in Morcella; an enchanting medieval village in Umbria; the Green Heart of Italy. The couple’s sailing adventures continued throughout the years, they have sailed in the South Pacific, Mediterranean, Caribbean and the Atlantic and Pacific Oceans\nLiving an adventuresome life, Joyce discovered her passion for writing as she journaled her experiences.  She is adept at using her creative flair and imaginative thinking to bring her stories to life, pulling the reader along as they turn the pages.  Her books are often rated as one the most popular books of the month on various internet websites.\nAbout the Author\n\n\n\n\n\nBUY NOW:  https://www.amazon.com/Landing-Star-Umbria-Joyce-Lorenzo-ebook/dp/B01IIC9T44/ref=sr_1_1?s=books&ie=UTF8&qid=1521557579&sr=1-1&keywords=landing+on+a+star+in+umbria\n\nReader's Favorite Book Review ★★★★★ \n\nReviewed by Romuald Dzemo for Readers' Favorite.\n\nLanding on a Star in Umbria by Joyce Di Lorenzo is an interesting autobiography that follows one woman’s life after a devastating loss as she struggles to give sense and meaning to her existence. After the untimely death of her mother after suffering a stroke, Joyce becomes listless, unfocused, and absorbed by grief. Then one day, her husband, Vince, makes a proposition that takes her off guard and gives her life a new direction: find a home in Italy. In this autobiography, she takes readers on a journey to one of the most exotic places in Italy, Umbria, making them feel the ambiance of the place, its beautiful cuisine, its great architecture, and its rich culture.\n\nThis is a lovely story that explores an individual’s struggle with loss and how the search for a new home allows her to reconnect with herself and the world, and to heal. Readers will be gripped by the compelling narrative voice, by the author’s gift for storytelling, for capturing details in her narrative without losing sight of the broader picture. The story is emotionally rich and it also offers powerful insights into what it takes to find a new home. I enjoyed the way the individuals come out through this narrative and how the narrator establishes relationships that are essential in the progress of the story. The setting is well captured and it is developed in a way so that readers can easily feel as though they were part of that beautiful world. Joyce Di Lorenzo’s writing is impeccable and Landing on a Star in Umbria will both entertain and inform readers.  \n\n\n\nThis is the compelling true story of my life as a refugee immigrant child from Indonesia to Holland; a tiny country on the continent of Europe and ultimately to the United States; a world power country on the continent of North America.  It is the story of our search for a better life, as told by my loving mother and grandmother while I was growing up and as I remember living it with my younger sister.  Although the dates sometimes may not be historically accurate, the experiences are true and consequently, the deep emotion with which I composed each chapter is genuine and gut wrenchingly heartfelt.\n\nThe story begins with my grandmother who was born to Muslim parents on May 1, 1910, in Banjuwangi; a port city located near the Bali Strait on Java; the fourth largest island of Indonesia, the heart of the nation.  Boasting a dazzling array of bewitching landscapes, magical archaeological sites, iridescent rice paddies, smoking volcanoes and rainforests, it is an island of mesmerizing natural beauty with profound traditions in art, music, dance, and cuisine.  My grandmother was at a young age when her parents divorced and her mother re-married a Christian man who adopted her. The family moved to the tropical jungle island of Borneo; the third largest island in the world, where the pace of life was relaxed and natural. \n\nAt the age of sixteen, my grandmother married my grandfather, they bore three children.  Their oldest daughter was born in September 1927, in Singkawang; known as the “City of a Thousand Temples” for the many temples found in the city and it’s surroundings.  After the birth of their daughter, the family returned to Java, where my mother was born in the city of Banjuwangi, in April 1929, followed by the birth of my uncle, two years later.\n\nMy father was born in 1924, in the city of Djombang, Java; near the birthplace of my mother.  \n\nThese exceptional Dutch-Indonesian people, made strong by the horrors they survived during Indonesia’s Wars for Independence, made passionate by their optimism and courage to create new beginnings, were the backbone of my family and accordingly, the significant influence of my childhood, which shaped my character as an adult.\n\nI was born in January 1951, on the island of Java, in the village of Surabaya.  After the Indonesian National Revolution, which followed World War II, my family, forced to leave independent Indonesia, repatriated to the Netherlands.  I was a baby when we made the month-long voyage to the Port of Rotterdam on a refugee ship called the Groote Beer; the Great Bear. \n\nThroughout my life, I shared my heart and soul with my younger sister; Ellen.  From the day she took her first breath, we were kindred spirits. When I was five, my parents divorced, consequently, my sister and I were raised by our mother and grandmother.  At the age of ten, our family immigrated to the United States to chase the American Dream.  By coincidence, it was also the Groote Beer that crossed the Atlantic Ocean and brought us to New York.  I will never forget the day when our ship entered the harbor and we sailed past the Statue of Liberty; the global symbol of hope and freedom.  Even in my young life, I knew that when the tugboats safely guided our ship to the harbor; our point of entry into the Land of Opportunity, it was a powerful and emotional moment.\n\nOur mother, then just barely in her thirties, aspired for something better for her children, her mother, and herself.  Through grit, determination and force of will, she strove to give us a divine childhood while shaping our character, teaching us how to choose wisely and recognize that in life every choice will create either an opportunity or an obstacle.  Instead of sheltering her daughters from struggles, my mother encouraged us to be bold by taking healthy risks and facing challenges.  By example, she taught us that steady work achieves dreams, that putting others before self has great benefits and that staying optimistic is key.  Our grandmother taught us to be endlessly optimistic by not looking at those who are worse off.  “There is no bottom to that,” she would say.  \"Instead, look at those who are better off and find a way to get there.”\n\nMy sister and I are their legacy, we are the women we are as a result of my mother and grandmother leading the way on Our Bold Path to Prosperity.\n\nBUY NOW: https://www.amazon.com/Bold-Path-Prosperity-Joyce-DiLorenzo-ebook/dp/B077PLRDJ4/ref=sr_1_1?s=books&ie=UTF8&qid=1511579077&sr=1-1&keywords=Our+Bold+Path+to+Prosperity\n\nReader's Favorite Book Review ★★★★★ \n\nReviewed by Ruffina Oserio for Readers' Favorite\n\nOur Bold Path to Prosperity by Joyce DiLorenzo is a moving autobiography that explores the life of an immigrant and what it means to survive and succeed in foreign lands. The protagonist shares a story that allows readers deep insights into the culture and history of Indonesia following WWII, the challenges of moving to another country, and what it meant to finally settle in the US. Born to Indonesian-Dutch parents, the protagonist’s family moved from Indonesia to Holland just after the Revolution in search of a better lifestyle, but the divorce left the children alone under the care of their mother and grandmother. Follow their story as they move to the United States, pursuing greener pastures and how, through determination and relentless toil, they were able to prosper.\n\nThis is a gritty autobiography, beautifully written and filled with insightful passages. Readers will encounter strong women in this story, including the grandmother of the protagonist, her mother and her sister. We look at these great women as they deal with life-changing moments, including divorce, immigration challenges, and embracing a new culture. It is also interesting how these women could transform their obstacles into opportunities, taking calculated risks without fear and trusting in life. I enjoyed reading about Joyce DiLorenzo’s mother, a woman who is determined to succeed and who instills in her children the lessons she’s learned herself, teaching them to fight for the things they value. Our Bold Path to Prosperity is told in a very candid and powerful voice and the prose flows gracefully. I enjoyed the author’s gift for description and the ability to create scenes that are deeply emotional, focused, and that grab the reader’s attention. This is a delightful and inspiring tale that shares what it means to be an immigrant.\n\n\nemail: jdiloren@comcast.net text: 415.987.7960", "pred_label": "__label__1", "pred_score_pos": 0.8930476903915405} {"content": "Marketa Kemp Monotypes: from Creativity to Expression\n\nHow and when did you decide to become an artist?\n\nI cannot really say I ever made the conscious decision to be an artist. I think I have always been interested in ‘creativity’ in various forms, but more as a past time.  I know the time when I become serious about making art was in 2015 when I travelled to Paros (Greece) to undertake a course in watercolor at The Aegean Center for The Fine Arts.  This is where my passion for art was truly awakened, and I have not stopped making art ever since.\n\nMarketa Kemp Self-Portrait black and white photograph\n\nWhat are your other interests?\n\nI love hiking. Camping is fine, but to get up to the top of a mountain, where one can only get on foot, brings this unexplainable contentment and happiness.  It’s the true feeling of ‘being at one with nature’. Perhaps this is one of the reasons why my art is mostly nature inspired. I’m also a bit of a gym addict, and not afraid to admit it!\n\nMarketa Kemp fog and dew landscape morning hike\n\nDo you have any artists that you find inspiring? It can be someone you learned from, are friends with, or admire. \n\nThere are many, each for different reason. I have a huge admiration for Frida Kahlo. Not only for her art but also her strength, passion and persistence in going after her goals, not only in art but in life. The Old Masters, Rembrandt, Edgar Degas are my greatest role models.  From the contemporary artists I find Godwin Bradbeer (with whom I met and have done several workshops) very inspiring.  Wayne Viney who taught me printmaking will always be one of the artists I look up to.\n\nMarketa Kemp three framed monotypes\n\nAs you described in your \"About\" from your website, you were drawn to printmaking because you enjoy the \"random imperfection, unpredictability and surprise [of] the process\". Why is this important to you and your artistic expression?\n\nI feel it infuses the artwork with so much freedom. For me it is particularly important as I naturally tend to be a little bit of a perfectionist. To strive for perfection in art can sometimes be limiting and inhibiting, and I know I can be somewhat prone to it. The unpredictability I find in monotype printmaking loosens my approach and creates artwork that is organic and often open to interpretation.\n\nThe Australian landscape is often captured in your artwork. What makes Australia special to you in comparison to the other places you have travelled and lived?\n\nAustralia has been my home for almost twenty-four years, and I feel deeply connected to its landscape. In my work I try to capture the emotion and how the landscape makes me feel, rather than to replicate the exact vista. Australian landscape is where I find such emotions to be the strongest. There are many amazing places in the world though, which I would and have used in my art; that’s especially true for  the island of Paros in Greece, and naturally the city where I was born which is Prague in the Czech Republic.\n\nMarketa Kemp Australian outback bush\n\nIn terms of your community, do you surround yourself with other creative people/other artists? How would you describe the community that you are a part of?\n\nYes, absolutely. I go to life drawing sessions when I can and have formed some close friendships there over the years.  I am also in regular contact with several artists, with whom we exchange tips, ideas and artistic opportunities; or sometimes just catch up for a drink and chat. When I’m working though, I like to be alone…\n\nMarketa Kemp - charcoal from life drawing classes nudes\n\nHow has your artistic practice changed over time? \n\nI started primarily as a painter. But since I discovered printmaking and ink my practice has slowly moved towards creating works on paper.\n\nMarketa Kemp studio shot with tools and monotypes drying\n\nDescribe creating a monotype. For example, do you work on one piece at a time or do you have multiple pieces in process at once? Do you sketch in the landscape first and then create in your studio? What time of day are you post productive? Do you work in small bursts or steadily over time?\n\nFor me a monotype requires a full day.  I will start mid-morning and often continue well into the night. I usually sketch the landscape first before rolling out ink. When using a specific geographical location for a reference I often use a photograph and blur it out to remove the detail, which allows me to focus on the light and shadow rather than being too specific with the detail to begin with.\n\nMarketa Kemp camping blurry sfumato\n\nThe first layer of the monotype is generally the background, water, sky and the clouds. I will create this image on the plate in various tones and roll it through the etching press to print it. I will spend more time on the second layer and paint the actual landscape on a clean plate, then print it on the same sheet of paper. I often use random tools such as toothpicks, sponges, old cut up credit cards, toothbrushes, cotton buds etc.  I find that these create interesting textures. Sometimes I return to the monoprint once it has dried and scratch into in with a scalpel for more texture.... the process can go on forever.  But I generally work on one piece at a time.\n\nMarketa Kemp a monotype ready to be printed on the press\n\nMarketa Kemp tools of the trade\n\nNext article William H. Hays : Sharing his process for relief printing", "pred_label": "__label__1", "pred_score_pos": 0.9761308431625366} {"content": "Autumn Fashion Trends 2020\n\nBy Imani King\n\nAs the temperature slowly decreases, and sunny days are making less and less of an appearance, people are being forced to ditch the shorts and dresses and bring out their fall looks. As a result, I took a deep dive into various social media platforms and designer webpages to find the hottest trends for the 2020 chilly season and deliver them to you. \n\nContinue reading “Autumn Fashion Trends 2020”", "pred_label": "__label__1", "pred_score_pos": 0.994087278842926} {"content": "Smooth victory for Ruben in Yokohama\n\nRuben (ATP-153) has easily qualified for the second round of the challenger tournament in Yokohama, Japan. In the first round he was too strong for a South African.\n\nRuben started as the sixth seed in Yokohama. In the first round he was up against Harris Llyod (ATP-277). In the first set had to the Belgian had to save three break points, one break was enough to win the set 6-3. Afterwards Ruben was no longer in trouble, with 6-4 in the second set he took the victory. The match lasted just under an hour.\n\nIn the next round Ruben will play against wildcard Kaito Uesugi (ATP 1126).", "pred_label": "__label__1", "pred_score_pos": 0.7049681544303894} {"content": "Quilvio Hernandez\n\nPerson Placeholder\n\nPosition Title\nMajor(s): Mathematical Analytics and Operations Research\nYear:  Senior\n\n\nMajor(s): Mathematical Analytics and Operations Research\nYear:  Senior\nE-mail: qahernandez@ucdavis.edu\n\nWhy would you want to serve?\nProgress in education doesn’t come without the voices of students. I want to bring my experiences to the discussion of how we can challenge the status quo and further improve the undergraduate experience for my fellow Aggies and Aggies of the future. \n\nWhat issues do you feel are important for undergraduate students?\nMental Health: I feel the stigma on mental health has been moving in the right direction over the past couple years, however it continues to be a prominent issue for undergraduate students resulting in distress, anxiety, depression, and poor academic performance.\n\nStudent Empowerment: The greatest good any institution can do is instill confidence in its students. The benefits of confidence are numerous such as improved mental health, ability to take risks, improved leadership and more that create a positive ripple effect. Beyond instilling confidence, I believe another aspect of student empowerment is to empower them to pursue their ambitions. Many majors are stigmatized. For example, as a math major I often get “What’re you even going to do with math? You should just study computer science.” Yet, math majors are found in nearly every industry, and especially among tech companies math majors are highly valued. Career paths are almost as unique as individuals themselves, and no student should feel as though they have to follow a formulaic walk of life because of their major.\n\nDiversity & Inclusion: D&I is often used in terms of race, however I think the Davis community does an excellent job at creating a welcoming atmosphere for students from any racial/ethnic background to feel accepted and find a home. I believe the biggest diversity and inclusion issue that needs to be addressed is in socioeconomic terms. Students from poorer backgrounds are fighting an uphill battle. There are many great programs to help close this gap such as Avenue e, EOP, First Generation Initiative, etc., but this is not an issue we can be complacent on. Davis should continue to strive for an equal playing field among all its students. Another issue I’ve seen is regarding women in STEM, specifically the TEM terms. It’s important to ensure women feel a sense of belonging and assured they are surrounded by allies, both from students and faculty.", "pred_label": "__label__1", "pred_score_pos": 0.9372267723083496} {"content": "Quick Answer: Can You Use Magic Erasers On Glass Windows?\n\nWhat can you not use magic eraser on?\n\n4 things you should never clean with a Magic EraserYour car.\n\n\nStone benchtops.\n\n\nStainless steel..\n\nCan you use Mr Clean Magic Eraser on a glass top stove?\n\n\nCan you use dawn on glass top stove?\n\n\nHow do professionals clean glass shower doors?\n\nFill a spray bottle with white vinegar, and use it to thoroughly saturate the glass. Let the vinegar soak in for at least 10 minutes. Let it soak even longer if there’s significant buildup. Dip a scrub sponge into baking soda, and scrub the glass.\n\nAre Magic Erasers safe on glass?\n\nThe Magic Eraser is safe and effective at cleaning glass showers. … Clean Magic Eraser is a multipurpose cleaning tool that helps homeowners solve difficult cleaning situations. It’s safe on a range of surfaces such as walls, kitchen counters and glass showers.\n\nHow do you get hard water spots off glass?\n\nRemoving Water Marks From Large Glass or WindowPrepare a mixture of 50% water and 50% vinegar. … Now spray this mixture on the areas with water spots. … Rinse the glass thoroughly and remove excess water using a sponge. … If there are some stubborn water marks, you can loosen the mineral deposits using an old toothbrush.\n\nHow do you get rid of haze on inside of windshield?\n\n\nCan Magic Eraser be used on teeth?\n\nI’m not sure who first thought using a Magic Eraser on their teeth was a good idea, but it turns out it’s actually pretty effective for removing food and drink stains. Since the Magic Eraser Original sponge is non-toxic it’s completely safe as well, but you have to be careful not to rub it on your gums.\n\nCan you use magic eraser to clean windows?\n\nClean Magic Erasers. This little-known method can be used on the inside of windows and helps to remove any heavy build up and haze. … It should be used lightly, especially on tinted windows, because the eraser can abrade the windows tint.\n\nWhat is the best way to clean glass windows?\n\n\nDoes Magic Eraser scratch glass?\n\nMagic Eraser Bath with Febreze Lavender Scent This eraser is specifically manufactured to clean glass shower doors and many other surfaces in the bathroom. Glass scratch score: There is a 0% chance this product with scratch a glass surface.\n\nHow do hotels keep glass shower doors clean?\n\n\nHow do I make my shower doors sparkle?\n\n\nWhat is the best cleaner for glass?\n\nBelow, our guide to navigating the options and choosing the best glass cleaner for you.BEST OVERALL: Windex Ammonia-Free Glass and Window Cleaner.RUNNER UP: Sprayway Glass Cleaner Aerosol Spray.BEST FOR VEHICLES: Invisible Glass Premium Glass Cleaner.BEST WIPES: Glass & Surface Wet Wipe Cloth.\n\nDo Magic Erasers have chemicals in them?\n\nEnter the Magic Eraser ($8), an ordinary-looking sponge that, despite a few rumors, is actually nontoxic. … Formaldehyde is not and has never been an ingredient in Magic Eraser. One ingredient in Magic Eraser (formaldehyde-melamine-sodium bisulfite copolymer) contains the word “formaldehyde” in its chemical name.\n\nCan I use magic eraser on glass shower doors?\n\nSimply wipe your Magic Eraser firmly across the glass shower doors with a firm, steady swipe. All it takes is a few wipes to break through soap scum and hard water. Your doors will go from grimy to shiny in no time at all.\n\nWill Magic Eraser remove pencil from wall?\n\n\nWhat is the best cleaner for glass shower doors?\n\nThe 6 Best Cleaners for Glass Shower Doors of 2021Best Overall: Puracy Organic Natural Multi-Surface Cleaner at Amazon. … Best Natural Cleaner: Seventh Generation Glass Cleaner Fragrance Free at Instacart.com. … Best for Hard Water Stains: Bio Clean Hard Water Spot Stain Remover at Amazon. … Best for Soap Scum: … Best Repellent: … Best Daily Spray:\n\nWhat do professional window washers use to clean windows?\n\nProfessionals use squeegees fitted with a stable rubber blade. Get two or three of these to keep at hand. Remember that the rubber blade should be changed once a day. This is recommended because when the edge of the blade gets rounded, nicked, sliced over time, we cannot clean effectively with it.\n\nWhy do magic erasers work so well?\n\nMagic Erasers are sponges made of melamine foam, which have been used for decades as an insulation and soundproofing material. … It works because when melamine resin cures into foam, its microstructure becomes almost as hard as glass – causing it to act like super-fine sandpaper on stains.", "pred_label": "__label__1", "pred_score_pos": 0.5192750692367554} {"content": "The Dwarves are for the Dwarves!\n~ Griffle's motto\n\nGriffle is a supporting antagonist in The Last Battle, the final book in The Chronicles of Narnia series by C.S. Lewis. He is the leader of the dwarves who refuse to acknowledge the existence of Aslan, and even fight against the heroic Narnian loyalists during the Battle of Stable Hill.\n\n\nGriffle is a Black Dwarf, one of the two ethnicities of Dwarf in Narnia (other than Red Dwarves). As a Black Dwarf, he is generally more sullen than Red Dwarves but like all dwarves is an excellent smith, miner and archer.\n\nDuring the conquest of Narnia by Rishda the Tarkaan, Griffle is one of the many Narnians taken in by the \"Tashlan\" ruse that Shift and Ginger perpetuate: that the Narnian god Aslan and the Calormene god Tash are in fact the same being.\n\nHaving been sold into slavery by Shift, Griffle is one of thirty dwarves rescued from the salt mines by King Tirian and informed of how they have been deceived (Tashlan being a donkey in a lion's skin). He immediately declares that \"the Dwarves are for the Dwarves\" and that they will not follow anyone but themselves, claiming that neither Aslan nor Tash are real.\n\nDuring the Battle of Stable Hill, Griffle and his dwarves show their true villainous colours when they use their natural proficiency in archery to indiscrimately shoot people participating in the battle. This includes not only Carlormenes but also Narnians attempting to defend their land. They also ruthlessly kill the Talking Horses after seeing them trying to rescue the captive Narnians.\n\nWhen the world of Narnia is destroyed by Aslan, who allows all the inhabitants the choice to join him in Aslan's Country, Griffle and his dwarves become deluded due to their stubborn refusal to believe in Aslan. They believe themselves to be trapped in a stable, unable to leave. Aslan says that not even he can help them, and they presumably end up in Tash's Country, the equivalent for Hell in The Chronicles of Narnia series.\n\n\n           NarniaTitle.png Villains\n\nThe Magician's Nephew\nJadis the White Witch | Uncle Andrew\n\nThe Lion, The Witch, and the Wardrobe\n\nPrince Caspian\nMiraz | Telmarines (Sopespian & Glozelle) | Nikabrik | Hag & Werewolf\n\nThe Voyage of the Dawn Treader\nGreen Mist | Gumpas | Pug\n\nThe Horse and his Boy\n\nThe Silver Chair\nLady of the Green Kirtle | Gentle Giants | Quarrelling Giants\n\nThe Last Battle\nShift | Rishda the Tarkaan | Ginger | Tash | Griffle\n", "pred_label": "__label__1", "pred_score_pos": 0.8980342149734497} {"content": "What Is Human Reality?\n\nAre perceptions reality?\n\nReality is fact.\n\n\n\nWhen it comes to your company’s costs, perception is reality..\n\nHow does the brain hallucinate reality?\n\nEverything that we perceive, everything that we experience, is a result of the brain interpreting the sensory information that comes in in a particular way. … Now you could say that all of our experiences are all hallucinated. It’s just that whenever we agree about what’s out there, that’s what we call reality.\n\nHow do you define existence?\n\n\nDo things exist when not observed?\n\n\nWhat are the characteristic of human person?\n\nQualities that form the foundation of all other human qualities include honesty, integrity, courage, self-awareness, and wholeheartedness. These qualities define who we are as human beings.\n\nWhat does the universe exist within?\n\n\nWhat is nature life?\n\nLife is defined as a “condition” that distinguishes animals and plants from inorganic materials and dead organisms. Life is comprised of processes and is a maintained state. The most sophisticated form of life is man and our though focuses upon the nature of the life and death of man.\n\nDoes our brain create reality?\n\nAbstract. It is well established that perception is not a reliable copy of the external world, but only part of it composed by external stimuli, while the rest is constructed by the brain. This means, that the brain creates only the reality it is interested in for the survival of the organism.\n\nDoes the past really exist?\n\n\nDoes objective reality exist?\n\n\nWhat is reality in psychology?\n\nIn Freudian psychology and psychoanalysis, the reality principle (German: Realitätsprinzip) is the ability of the mind to assess the reality of the external world, and to act upon it accordingly, as opposed to acting on the pleasure principle.\n\nWhat is the true reality?\n\nReality is the sum or aggregate of all that is real or existent within a system, as opposed to that which is only imaginary. … The term is also used to refer to the ontological status of things, indicating their existence. In physical terms, reality is the totality of a system, known and unknown.\n\nWhat is the point of human existence?\n\n\nWhat is the concept of human being?\n\nA human being is not just an aggregate, a collection, of organs or organic parts and processes, but an or ganism, a proper subject for psychological ascriptions; there is a logical gulf be tween the two concepts: they belong to different categories, different logical types.\n\nWhat is the ultimate nature of reality?\n\nFrom Wikipedia, the free encyclopedia. Ultimate reality is “something that is the supreme, final, and fundamental power in all reality.”\n\nDo we see reality?\n\nIn his research to uncover the underlying secrets of human perception, Donald Hoffman has discovered important clues pointing to the subjective nature of reality. … To put it simply: we actively create everything we see, and there is no aspect of reality that does not depend on consciousness.\n\nWhat is a human in philosophy?\n\n\nIs reality an illusion?\n", "pred_label": "__label__1", "pred_score_pos": 0.9951440691947937} {"content": "‘Glossa’: a poem by Andreea Iulia Scridon\n\n\n\n\n(in response to M. Eminescu)\n\n\nhow you starfished your way\nacross the pool of infinity bay\nhow you and paradise made eye contact\nbeyond the winding slide’s colorful digestive tract\nhow the clouds were milky pterodactyls in the sky\nhow you met the ocean’s eye\nhow you spun in circles on your back like a toy\nyour youth your most precious alloy\n\nRemember the Atlantic,\nits currents cream, its waves ink\nRemember the Pacific,\nits gulf turquoise, its sands pink\n\nAnd remember, remember,\nremember this -\nlike the waters, their ebullitions,\nfor all their durable afterglow,\nall things come and all things go\n\n\nAndreea Iulia Scridon\n\nAbout Andreea Iulia Scridon\n\nAndreea Iulia Scridon is a poet and translator. She studied Comparative Literature at King’s College London and Creative Writing at the University of Oxford. In 2020, she was awarded the University of Oxford’s STAAR Editorial Prize. She has a poetry pamphlet forthcoming with Broken Sleep Books in 2022.", "pred_label": "__label__1", "pred_score_pos": 0.5766955614089966} {"content": "Bragagni New San Marino Honorary Consul of the Republic of San Marino to the United Kingdom of Great Britain and Northern Ireland\n\nItalian-born British technology innovator and businessman Dr Maurizio Bragagni has been appointed Consul of San Marino in United Kingdom of Great Britain and Northern Ireland.\n\nHe will be responsible for furthering the interests of San Marino, supporting friendly relations among the two countries.\n\nSan Marino has around 32,000+ citizens who enjoy a home territory of just 24 square miles and surrounded on all sides by Italy.  It is the third-smallest state in Europe after the Vatican and Monaco. Until the independence of Nauru (1968), San Marino was the smallest republic in the world.\n\nAs a Consul to the State Dr Bragagni will have a significant role in representing the state – which has official relations at the diplomatic level with Britain, across political and economic relations and social and cultural affairs internationally.\n\nDr Bragagni’s role will include furthering the development of commercial, economic, cultural and scientific relations and, where required, assisting both individuals and corporate bodies.  \n\nHis post also, from time to time, will require Dr Bragagni to undertake various diplomatic missions.\n\nThe largest Sammarinese ex-patriate community is in Detroit, USA, with smaller settlements in France and Switzerland. Despite its small population, the country has consuls posted around the world.\n\nThis pretty state sits on the slopes of Mount Titano on the Adriatic side of central Italy between the Emilia-Romagna and Marche regions and in 2008 Mount Titano and the historic centre of San Marion were designated a UNESCO World Heritage Site.\n\nThe country’s economy mainly relies on finance, industry, services and tourism. Despite having a small economy for a nation-state, it is one of the wealthiest countries in the world in terms of GDP (per capita), with a figure comparable to the most developed European regions. San Marino is considered to have a highly stable economy, with one of the lowest unemployment rates in Europe, no national debt and a budget surplus. \n\nDr Bragagni is CEO and Chair of advanced technology cable company Tratos, which has research, development and production facilities in the UK and Italy and offices worldwide.", "pred_label": "__label__1", "pred_score_pos": 0.96766597032547} {"content": "Democracy in Review\n\nEarlier this year, the world bore witness to the 2020 American presidential elections. Despite the headline-grabbing accusations of fraud and potential coup d'état, perhaps the most staggering outcome of the process was that roughly half of the American voting base did not have an approved candidate elected - almost 74 million at the time of writing. Despite the alarming nature of such underrepresentation, this is by no means a novel phenomenon. In 2012, over 63 million voted against Obama and in 2016, 73 million voted against Trump.\n\nThe deductive reader may ask, ‘is this not inevitable?’. After all, two polarised political parties hold the majority of political influence and each party can only select one candidate. I hope to demonstrate instead, how moderate reforms to the voting system could bring vast improvements to the strength of their democracy.\n\nIn order to decide on a better voting system, we must know what we want from it. This is not an easy question to answer as there is no objective hierarchy, but instead, various axioms on which to align a voting system — the primary values being pluritarian and majoritarian. In their most simple terms,\n\nPluritarian values having the most votes.\n\nMajoritarian values having the majority of votes.\n\nThese values can sometimes clash, despite sounding similar – the majority is a plurality, but a plurality is not necessarily the majority. Pluritarian denotes a system which places value on the winner having the highest number of the votes. Such a system operates on the principle of the most popular candidate being awarded control – even if they do not have a majority of the popular vote. This can be seen in the British House of Commons, where no government has won over 50% of the popular vote since 1935. Conversely, in a majoritarian system the elected candidate must win the majority - over 50% - of the popular vote to assume control, as seen in the American electoral college.\n\nLet us evaluate then, a typical first-past-the-post system, the American presidential elections. Note, here we are dealing with electoral votes rather than individuals’ votes for simplicity - the disconnect between the electoral college system and popular vote is a topic for its own article. In the US elections, there are a total of 538 electoral votes, of which a candidate must receive a minimum of 270 – one more than half – to win the presidency. The winning candidate requires a majority of the votes and not the biggest share of votes and so, this is a majoritarian system. Such a system benefits from simplicity: it is very easy to understand and participate in; the winner takes all; and each 'voter' only votes for a single candidate.\n\nSimplicity is, however, not without cost. One major flaw of first-past-the-post is known as the Spoiler Effect. This is where the addition of a new candidate can change the outcome of the election without winning the election themselves. For example, consider the 2000 US presidential election. The three candidates in question were: the Republican, George W. Bush; the Democrat, Al Gore; and the Green Party candidate, Ralph Nader. From the results provided by the Federal Election Commission, Al Gore lost the electoral vote at a final result of 271 to 266 votes in favour of Bush. Notably, Florida, with 25 electoral votes at the time, was won by Bush with 2,912,790 votes versus Gore's 2,912,253 votes - a measly 537 votes difference. Nader received 97,488 votes in Florida, clearly enough to swing the state and thus, the election, had he not run. In fact, a 2006 study from UCLA and Dartmouth College estimated that of the Nader voters in Florida who would have voted in an election without Nader, 60% would have voted for Al Gore. While no one can claim so with certainty, it is likely that Nader's participation resulted in the Spoiler Effect.\n\nAnother flaw of first-past-the-post is tactical voting, where a voter places their vote towards a party who is not their first preference. In America, this is exemplified in the sentiment that voting for a political party other than the Democrats/Republicans is a 'wasted' vote; as demonstrated by the 2020 election this belief is by no means illogical, but intrinsic to the system. The reason tactical voting is undesirable is because the voting results are distorted to not represent what the people believe to be the best candidate. This is especially true of the UK general elections which follow a pluralitarian first-past-the-post system. This has resulted in the common election strategy to vote against the Conservatives by voting for the next most likely to win.\n\nSo, what can be done? I propose a voting system for the UK which would require minimal alterations to the current system – instant runoff voting. In this system, each vote is a ranked list of candidates. In the initial count, every vote is put towards their highest preference and if a single candidate has enough votes - say, a majority - then they are elected. Otherwise, the candidate that received the least number of first preference votes is eliminated. Each vote which listed this eliminated candidate as highest preference is transferred to the next highest preference listed and the votes are counted again. This process is then repeated until a candidate has enough votes to win. While a system where multiple candidates can win could be more representative, it could also require major changes to how government is run and so, is just not feasible to implement.\n\nInstant runoff voting is not a purely theoretical system. Australia uses this system for most of its single winner elections. The state of Maine was also the first American state to use instant runoff voting for the presidential election of 2020, with Alaska set to adopt instant runoff for all of its elections starting from 2022. A number of local American elections - including New York City - use instant runoff voting as well. Details of whether you must rank every candidate and the criteria for eliminating a candidate may vary by system, but the advantages remain.\n\nInstant runoff voting also greatly disincentivises tactical voting. This does not mean there is no incentive, in fact it can be proven that no fair system can have no tactical voting (see the Gibbard-Satterthwaite theorem). However, with instant runoff, even if your first choice does not win, your vote is not discounted, but instead still serves your interests by transferring on to your next preference. Another advantage over a first-past-the-post system is that, when everyone votes honestly, a new candidate joining the ballot is less likely to change the outcome of the election unless they win it, thus diminishing the Spoiler Effect.\n\nInstant runoff is certainly not a perfect system. For example, the process of voting is more complicated which may result in more invalid ballots. There may also be additional costs involved in counting the vote. Despite this, instant runoff voting is clearly a superior system to first-past-the-post, offering the optimal balance between minimal reformation and greater representation.", "pred_label": "__label__1", "pred_score_pos": 0.7639383673667908} {"content": "\nEdit Story\n\nRiskier Behaviour During Pandemic Is Causing More Accidents\n\nAlex Ledsom\n\nIt could be assumed that during a pandemic there would be fewer people driving and fewer accidents and road deaths. Actually, the picture is much more complicated—research suggests that the inverse has actually been true.\n\nThere were fewer cars on the road, everywhere\n\nThe National Highway Traffic Safety Administration (NHTSA) announced unsurprisingly that there were fewer cars traveling during the height of the pandemic—total traffic volume fell 16% on U.S. roads during the first half of 2020, according to Axios.\n\nSo accidents initially decreased...\n\nIn France, one of the largest car assurers Maif, announced on April 12 that it was to return €100 million ($117 million) to 2.8 million members who had assured roughly 3.8 million cars because the number of car accidents on the road had dropped by 80% in the first three weeks of the pandemic (when France enacted one of the strictest lockdowns in Europe). As Le Monde pointed out, this amounted to roughly €30 ($35) per insured car.\n\nAccording to Autoplus, 250 people died on the roads in France in 2019 (an increase of 7.3% compared to March 2018) but in March 2020, this figure had decreased to 130.\n\n... but not for professional drivers\n\nHowever, it is worth noting that the number of road deaths for professional drivers of commercial or heavy-goods vehicles didn’t change–as reported by The Huffington Post. It’s another example of how frontline professions haven’t been protected from Covid-19 related issues as much as other workers.\n\nBut risky behavior increased...\n\nAnecdotally, lots of people have talked about how people appear to be driving more carelessly and much faster and this appears to have translated into actual statistics.\n\nA NHTSA study found that drivers who were seriously injured or were victims of fatal crashes had taken risks such as speeding, or not using seatbelts or had been driving while impaired. More drivers took alcohol, cannabinoids, and opioids during the second quarter 2020, than they apparently had done prior to the pandemic.\n\nThe Huffington Post reported that in France, excessive speeding (faster than 50km/h more than the authorized speed) increased by 12% when lockdown began (compared to the weeks before). Three weeks after France’s déconfinement (when it emerged from lockdown), 20 Minutes reported that there was an “alarming increase in fatalities” and a 15% increase in excessive speeding.\n\nDavid Juillard, in the department of Road Safety at the Ministry of the Interior suggested that it could have been due to drivers wanting to feel liberated after lockdown but Juillard also suggested it was due to a lack of rule-following.\n\nThis particularly resulted in a spike in accidents involving cyclists (many of whom were new out onto the roads) not wearing helmets, not signalling when changing lanes and drivers not giving them enough due care.\n\n... and so did fatalities\n\nIn the U.S., fatality rates increased 30% in the second quarter, reversing a three-year downward trend in road fatalities. The NHTSA believes that the pandemic pushed people towards riskier behavior but also that a lack of road safety messaging during the pandemic could have contributed.\n\nEconomic downturns generally lead to a decrease in traffic, people move less and there are fewer accidents. However, the impact of Covid-19 is unknown and there are theories that it might have the opposite impact on road safety. Research suggests that increased stress, more idle time, increased consumption of drugs and alcohol and \"greater opportunities for speeding and stunt driving\" would probably lead to more accidents rather than less.\n\nFollow me on Twitter or LinkedInCheck out my website\n", "pred_label": "__label__1", "pred_score_pos": 0.9588865041732788} {"content": "Development of a therapeutic HPV vaccine via target epitope identification by mass spectrometry\n\nProject Reference: 294098\nActivity Code: FP7-PEOPLE-2011-CIG\nCoordinator:Deutsches Krebsforschungszentrum\n\n\nAt least 20% of human malignancies are caused by consequences of persistent infections. High-risk human papillomavirus (HPV) types cause over 500.000 cancer cases per year, rendering HPV the #2 human carcinogen after tobacco. Infection-related tumours are attractive targets for cancer vaccination, as they provide the opportunity to target antigens that are immunological non-self. Vaccination can be prophylactic, inducing immune responses preventing infection in the first place, or therapeutic, stimulating the immune system into eradicating established disease. Prophylactic immunization against HPV has become the paradigm for cancer immunoprevention. Unfortunately, current HPV vaccines have no therapeutic effect on existing infections. Studies on spontaneously regressing HPV-induced lesions show that cell-mediated immune responses are crucial in clearing established HPV infection. Cytotoxic T cells (CTL) kill infected cells after recognizing viral epitopes presented on HLA molecules on the cell surface. There are hundreds of different HLA types, and a given epitope is only applicable for the fraction of patients with the relevant HLA molecule.\n\nThis project will define a set of T cell epitopes that elicit CTL-mediated HPV protection in the entire population, by including epitopes for all HLA supertypes. The applicant has established a methodology of determining which viral epitopes are presented on target cells during her past mobility period in the US. HPV-transformed cells of various HLA backgrounds are analyzed by nanospray mass spectrometry. Identified peptides are tested for immunogenicity and the ability to induce CTL. From these tests, a minimal set of functional epitopes providing >95% population protection coverage is selected for vaccine formulation. The technology is currently transferred to the DKFZ. If this epitope-specific, yet widely applicable therapeutic vaccination approach is successful, it can be used as a platform technology in other malignancies.\n\nProject Details: \n\nStart Date: 2011-12-01\nEnd Date: 2015-11-30\nEU Contribution: 100 000 Euro\nTotal Costs: 100 000 Euro\nProgramme Acronym: FP7-People\nSubprogramme Area: FP7-PEOPLE-2011-CIG Marie-Curie Action: \"Career Integration Grants\"\n\nPrint Version", "pred_label": "__label__1", "pred_score_pos": 0.968485951423645} {"content": "Input your search keywords and press Enter.\n\nUAE, Egypt, Qatar Strongly Condemn Houthi’s Launch of Missile at Riyadh\n\nThe United Arab Emirates, Qatar and Egypt have strongly condemned the Iranian-backed terrorist Houthi militia’s attempts to target civilian areas in Riyadh, Saudi Arabia, with a missile intercepted by Saudi air defenses.\n\nIn a statement by the Ministry of Foreign Affairs and International Cooperation on Monday 25 January, the UAE renewed its full solidarity with the Kingdom over these subversive terrorist attacks and reiterated its stance against all threats to the Kingdom’s security, stability, and the safety of its citizens and residents.\n\nThe statement emphasized that “the security of the United Arab Emirates and the Kingdom of Saudi Arabia are indivisible, and that any threat facing the Kingdom is considered by the Emirates a threat to its security and stability.”\n\nThe ministry re-affirmed that the UAE considers this attack “new evidence of terrorist groups’ endeavors to undermine security and stability in the region.”\n\nThe Egyptian Ministry of Foreign Affairs expressed solidarity with Saudi Arabia “as it faces these assaults that target its civilians.” It also pledged its full support for any defensive measures authorities in the Kingdom take to ensure the country remains safe from terrorism.\n\nThe ministry reiterated Egypt’s full support for all efforts to restore peace and stability in Yemen. It said attacks such as the latest on Saudi Arabia will result in an escalation of instability, and called for a ceasefire, so that the dispute can be resolved peacefully.\n\nIt stressed the importance of engaging in a political process to find a solution that respects the Gulf Cooperation Council and UN Security Council resolution 2216.", "pred_label": "__label__1", "pred_score_pos": 0.975734293460846} {"content": "Police seek help to find missing man at Kilkivan\n\nPolice are seeking community assistance to help locate Robert Weber, a 58-year-old Deagon man, reported missing from Kilkivan.\n\nHe was last seen on January 6 at the Kilkivan Hotel when Robert and his dog left in a white Ford Falcon sedan, and was planning to arrive at Dululu (Rockhampton) the following day, but has not been seen since.\n\n\nRobert (pictured) is described as Caucasian in appearance, approximately 177cm tall with grey hair and blue eyes.\n\nAnyone with information is urged to contact police immediately.\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9358362555503845} {"content": "As COVID-19 continues to impact travel, make sure to CHECK and FOLLOW all federal, state, provincial and local closures and public health guidelines. The border is currently closed between the United States and Canada, and many US states and Canadian provinces and territories have additional restrictions.\n\nHow to Prevent Blisters Hiking\n\nTwo worn hiking boots seen from the person wearing them. A person's lower legs with blue leggings and gray and blue socks are also visible. The person is standing on a wooden path\n\nThis post contains affiliate links, which means if you make a purchase I may receive a small commission at no cost to you. I only recommend products I fully believe in and heartily recommend. As an Amazon Associate, I earn from qualifying purchases.\n\nMaybe you’re luckier than me, but I have a really hard time with blisters! Different people have blisters in different places and have more or less trouble with them but one thing is for sure, having blisters makes hiking absolutely miserable!\n\nAll blisters are caused by some type of friction, so the key is to figure out what’s causing the friction and eliminate it. In this post, I’ll talk about how to prevent blisters hiking, including what has worked for me and a method that haven’t worked for me but has worked well for other people! I get blisters on the back of my heels going uphill, and I’ve determined that this is because the back of my heel is fairly small compared to my foot, so the back of my foot moves around too much and has too much friction. Other people commonly get them on or between their toes (I don’t get them in that location but I’ve heard that toe socks are very helpful for this). If you struggle with how to prevent blisters, here are some things to try!\n\nPrevent blisters hiking with shoes instead of boots\n\nI have never been able to find hiking boots that don’t give me blisters, and I’ve tried a few options, gotten fitted at mulitple outdoor stores, and it seems that my feet just don’t like boots! I do still sometimes where them, with lots of tape (see below), but I wear them as little as possible. Most of the time, I wear hiking shoes (get them here on Amazon or here at REI). I also sometimes wear 5 fingers (get them here on Amazon or here at REI) if I’m familiar with the trail (they aren’t good with lots of rocks) and it’s not wet (5 fingers aren’t great on wet surfaces). In the winter I wear rubber boots frequently and weirdly they are way more comfortable (for me!) than hiking boots! I know many people who wear running shoes, which is also a great option (although like the 5 fingers they are not waterproof). If you do wear boots, make sure to get fitted and break them in (and return them if they aren’t working for you!).\n\nUse medical tape or duct tape to provide an extra layer against your skin\n\nFor a long time, I used ordinary duct tape and taped up my heels to prevent blisters. And yes, I used that fancy patterned duct tape because why not? This worked well for me in preventing blisters, but it was really sweaty and kind of uncomfortable otherwise. Recently, I started using a layer of moleskin secured in place with medical tape, which is much more comfortable and just as effective, which makes sense because moleskin and medical tape are designed for this purpose! Hello?!? I should have figured that out a long time ago!\n\nWear liner socks\n\nI’ll be honest, this method hasn’t been enough for me (I need the tape method). However, many people swear by this! Liner socks are just a thin pair of socks you wear under another pair of socks. Even though there are special liner socks, you can really just wear any two pairs of socks that fit together. The nice thing about thin ones is that they’re less hot. Give it a shot! It works for many people.\n\nWhatever you try, you don’t have to just deal with it…you can prevent blisters hiking! It does take a bit of experimentation but hopefully what I’ve learned can speed up your path to a solution for blister free hiking!\n\nTwo worn hiking boots seen from the person wearing them. A person's lower legs with blue leggings and gray and blue socks are also visible. The person is standing on a wooden path. Text reads: 3 easy ways to prevent blisters when hiking\nJennie Flaming", "pred_label": "__label__1", "pred_score_pos": 0.9620522856712341} {"content": "Traffic counts and speed surveys\n\nAs part of the Streets for People project that has been running for the past year or so the City Council commissioned a number of traffic surveys on various roads in the Heaton area.\n\nThe surveys were carried out from Monday 5th to Sunday 11th June 2017 and is most cases recorded the number of vehicles in each direction and the speed vehicles were travelling at.\n\nYou can see all the data from the surveys at\n\nA lot of the results are not that surprising but there are some interesting points when the data is looked at closely. For example, the highest volumes of traffic are in the morning and evening peaks with traffic tending to be highest travelling westbound (towards town and the Central Motorway) on the morning and eastbound in the evening but there are streets that vary from the norm.\n\nHigh volumes of traffic on residential streets\n\nSome of the figures do raise some cause for concern. Warwick Street is a residential terrace the same size as most of the other streets in Heaton. The historical layout of the area has contributed to Warwick Street being used as one of the main routes to and from Heaton from the west. Now around 8000 vehicles are using the street each day which will contribute to high levels of noise and air pollution compared to other terraces in Heaton.\n\nDespite any vehicles heading towards the city centre or Central Motorway having to end up on New Bridge Street or Sadyford Road, Warwick street appears to be favoured by commuters heading west. On one day during the survey period 150 vehicles were recorded in a 15-minute period travelling towards town, a level of traffic that would be unacceptable on most narrow, terraced streets.\n\nSpeeding Drivers\n\nThe survey data also highlighted the prevalence of speeding drivers on Heaton’s streets. Speed data was reported as average speeds along with the 85th percentile – the speed at which 85% of drivers were travelling at or below.\n\nSpeed data collected on Heaton Road, a street with a 30mph limit shows the 85th percentile as just above the 30mph limit from 6am until midnight each day. While this means the majority of drivers are travelling at or below the limit at least 15% are breaking the speed limit every day.\n\nOf the 51761 vehicles passing the count point during the 7 day survey period the data suggests that around 7500 drivers were breaking the speed limit.\n\nThrough traffic\n\nMany of the streets at the south end of Chillingham Road were closed to through traffic many years ago. However, cross street between Heaton Road and Chillingham Road further north remain open and appear to suffer from high levels of through traffic. There is a big imbalance between east and west bound traffic with the number of vehicles travelling towards the city centre and Central Motorway far exceeding those traveling in the other direction. This could be because people perceive cutting through the residential streets is quicker than remaining on the Coast Road when heading west in the morning.\n\nOn Cartington Terrace for example the morning peak sees between 74 and 104 vehicles in an hour westbound with between 38 and 48 eastbound. However in the evening peak when it could be expected to see the numbers reversed there is still more traffic going west than east.\n\nThe table below shows the difference between traffic in each direction on Cartington Terrace.\n\nDay Eastbound Westbound Total\n05/06/2017 549 827 1376\n06/06/2017 573 900 1473\n07/06/2017 546 847 1393\n08/06/2017 587 861 1448\n09/06/2017 592 886 1478\n10/06/2017 396 481 877\n11/06/2017 366 511 877\nAlexandra Road House Access\nThe area of houses that can only be accessed by Alexandra Road\n\nAlexandra Road is another street that appears to suffer from a lot of through traffic.\n\nThere are around 147 houses that can only be accessed from Alexandra Road with a few more that need it for rear access.\n\nThe total number of vehicles using Alexandra Road each day\n\nHowever the street sees over 900 vehicles using it each week day and, like Cartington Terrace, many more travel west the east.\n\n\n\n\nThe full count and speed data, broken down by hour of the day can be seen at The raw data can also be downloaded from the Streets for People website.", "pred_label": "__label__1", "pred_score_pos": 0.9848043918609619} {"content": "What is Qigong?\n\n\"Qi\" translates to life force or energy. \"Gong\" translates to practice. Qigong is the practice of energy cultivation.\n\nQigong is a health art and science that originated in China approximately 5,000 years ago.  It is based on the ancient understanding, later proved by Albert Einstein, that everything in the universe is composed of energy and that everything has a dynamic energetic relationship with the rest of the universe.  Qigong originated with the belief that humans have an unfathomable amount of unrealized potential.  We are all, for example, capable of self-healing heavy-duty disease and illness, yet our ability to do this has been \"blocked\" over generations due to both the lack of attention we give our Qi and an inattentiveness to our natural dynamic relationship with the rest of the universe.  This lost balance most commonly manifests as physical unhealthiness, stress, loneliness, anger, unhappiness, and a lack of fulfillment.  These imbalances run rampant in today's world.  Luckily Qigong can help uncover the buried treasures that lie within everyone.   As Einstein proved, energy cannot be created or destroyed, but it can be transformed. Qigong's aim is to transform these energetic imbalances and restore one's natural state of being.\n\nQigong's wide scope of practice includes repetitive physical movements, special breathing, meditations, and visualization techniques to help clear the energetic blockages in the body that prevent us from manifesting our full potential as human beings.   Practicing Qigong on a regular basis greatly reduces the likelihood of developing disease or illness and creates an increased sense of overall happiness and peacefulness. Not only is Qigong a self-healing practice, It can also be used to greatly help others in the form of Qigong Healing Sessions, a form that Travis specializes in.\n\n\n\nWhat is a Qigong Healing Session?\n\nQigong Healing sessions are highly individualized, catering to the individual needs of the client.  Travis uses hands-on techniques, similar to gentle massage therapy, as well as non-contact techniques that move energetic blockages and restore the natural movement of life in the patient.  Qigong Healing sessions generally focus on empowering the three dantians (elixer fields), which are the centers of one's physical vitality, love, and wisdom.  Travis also works with the internal organ systems and meridians, much like acupuncture.  On a more surface level, healing sessions are often extremely relaxing and calming, and are a healthy, potent, and lasting way to relieve stress.  The aim for all clients is that they will eventually uncover self-healing abilities that help them to stay happy, healthy, and balanced without any outside health assistance.\n\n\nBehind the sky there is another sky.  \n\n-Master Robert Peng", "pred_label": "__label__1", "pred_score_pos": 0.8999136686325073} {"content": "ETF Fees Deducted From Your Investment\n\nFind Out How ETF Fees Are Deducted and How They Affect Performance\n\n••• Getty Images\n\nSince most ETFs passively track a benchmark index, such as the S&P 500, the best ETFs to buy are often those with the lowest expenses. Low expenses are one of the top advantages of ETFs and index-based mutual funds. This is why investors should be aware of ETF fees and expenses before buying the right funds for their needs.\n\nExpense Ratios and How ETF Fees Work\n\nWhen researching or looking at information on ETFs or mutual funds, one of the first pieces of information to look for is the expense ratio. The expense ratio, expressed as a percentage, is a management fee that is deducted from the fund's assets. These fees for ETFs (and mutual funds) are deducted to pay for the fund's management and operational costs.\n\nETF fees and expenses are typically lower compared to their investment cousins, mutual funds. Similar to mutual funds, ETF fees that are included in the expense ratio are not deducted or withdrawn directly from the investor's account; these fees are taken from the fund's assets before they are included in the investors assets.\n\nExample of How ETF Fees Are Deducted\n\nTo understand ETF fees and expenses, consider an example of an ETF or mutual fund that has an expense ratio of 0.50. This means that the fund's expenses are 0.50% of the fund's assets under management. In this example, the investment company managing the fund would deduct half of one percent from the fund's assets on an annual basis.\n\nThe investor will receive the total return of the ETF, less the expenses. For example, if the fund's total return (before expenses) during a year is 10.00%, and the expense ratio is 0.50 percent, the net return to the investor (after expenses) would be 9.50%. Doing some quick math, an expense ratio of 0.5% translates to expenses of $5 for every $1,000 invested.\n\nWhy ETF Fees Matter\n\nSince the majority of ETFs are passively-managed, their expense ratios tend to be much lower compared to most mutual funds. Since ETFs simply track a benchmark index, there is no need for a fund manager to research, analyze, or trade securities. When these costly activities are eliminated, the expense of operating the fund is lower, as compared to an actively-managed mutual fund.\n\nTypical expense ratios for mutual funds will range from about 0.50% to 2.00%, whereas ETF fees range from as little as 0.05% to about 1.00%. Therefore the lowest cost ETFs usually have lower expense ratios than the lowest cost index mutual funds.\n\nFor example, one of the most widely traded ETFs is the SPDR S&P 500 (SPY), which has an expense ratio of just 0.0945%. Through September 30, 2020, SPY had a 10-year annualized return of 13.74%. A popular actively-managed mutual fund with similar holdings is The Growth Fund of America (AGHTX), which has an expense ratio of 0.64%. AGHTX had a 10-year annualized return of 13.26% through October 31, 2020.\n\nETF Fees and Finding the Best Funds\n\nThe ETFs that have the lowest fees are not always the best funds to buy. Before buying an ETF, be sure to make apples-to-apples comparisons. For example, be sure that the ETFs you are comparing track the same index. It also helps to look at the performance history and the fund's total assets.\n\nThe fund's total assets are important to analyze because larger assets generally mean greater liquidity, which can impact an ETF's performance, especially in the short run. Therefore, ETFs with more assets are generally preferable to those with significantly lower assets.\n\nA growing trend among some of the largest brokerage houses, however, is 0% fees on a select group of funds. As an example, Fidelity Investments offers the following 0% funds: Fidelity ZERO Large Cap Index Fund (FNILX), Fidelity ZERO Extended Market Index Fund (FZIPX), Fidelity ZERO Total Market Index Fund (FZROX), and the Fidelity® ZERO International Index Fund (FZILX).\n\nAnother consideration if you plan to invest in multiple funds, is to research their holdings to ensure there is minimal or no overlap in investments. By doing so, you will avoid being overly weighted in a certain stock, which would defeat the purpose of diversification. As an example, if you decide to purchase three different funds and the top holding of all three happens to be Apple (AAPL), your portfolio returns might be too reliant on the success of one company.\n\nThe Bottom Line\n\nSmart investors do the research and comparisons on expense ratios before finding the best ETFs. When comparing ETFs that track the same index, the ETF with the lowest expense ratio is generally the best choice. In addition, ETFs generally have lower expense ratios than mutual funds.\n", "pred_label": "__label__1", "pred_score_pos": 0.8397848010063171} {"content": "Service Guarantee\n\n\nOur guarantee to you\n\n\n 1. Refund your service fees IN FULL\n 2. Attest your documents again, FREE OF CHARGE\n 3. FAST TRACK the completion of your attestation process (where possible) to minimise inconvenience.\n\nThere are some requirements, however!\n\nBefore we agree to attest your documents again…\n\nWe'll need contact details for the company or institution that rejected your attested documents, so we can validate their reasons for rejecting the document and help the correct documents reach them. This is the quickest way to correct any issues and reduce any delays.\n\nRestrictions to the guarantee...\n", "pred_label": "__label__1", "pred_score_pos": 0.9982860684394836} {"content": "Heads Up: Concussion Protocol in Loyola Athletics\n\nStephanie Miller | The PhoenixSenior midfielder Giann Magno heads a ball against a Missouri State player.\n\nRoughly 1.7 to 3 million concussions occur every year due to sports and recreational activities. However, five out of 10 of those concussions go unreported or undetected, according to the University of Pittsburgh Medical Center. Leaving a concussion untreated could lead to serious health issues. Loyola Athletics’ concussion protocol seeks to ensure the safety of student-athletes so they don’t experience those side-effects. \n\nAccording to the Mayo Clinic, a concussion is a traumatic brain injury (TBI) that can result from a blow to the head and affect brain function. The brain is normally protected inside the skull from everyday jolts by cerebrospinal fluid, but a sudden jolt to the head, neck or upper body can cause it to hit the inner walls of the skull.\n\n“Signs and symptoms of concussions are vast,” Corey Oshikoya, assistant athletics director for sports medicine at Loyola, said. “It could be a headache, nausea, disorientation or feeling foggy, sensitivity to light and noise… they could be irritable, have personality changes… those are all issues related to having a concussion.”\n\nIf it’s suspected an athlete at a Loyola game or meet has suffered a concussion, they are removed from play, according to Oshikoya. They then take a computerized test to assess whether or not they have one. \n\nThe team physician decides how to proceed based on the results of this test and the athlete’s symptoms, Oshikoya said. The athlete is then monitored on a daily basis until they no longer exhibit symptoms. \n\n“This is when we would begin our concussion program and protocol,” Oshikoya said. “This is a ‘returning back to play’ protocol based on the number of days [since the concussion], how they feel and as part of that, we would also initiate our ‘return to learn’ program.”\n\nWhen a Loyola student-athlete is suspected to have a concussion, the athletic academic advisors are contacted, according to Oshikoya. The advisors then get in contact with the student-athlete’s professors to let them know of any potential academic issues related to the concussion. \n\nLoyola’s athletic program reacts swiftly to head injuries because symptoms can become long-term for a student-athlete if their concussion is addressed poorly, Oshikoya said. \n\n“If [the student-athlete] continues to play, continues to participate, the symptoms can last longer,” Oshikoya said. “Therefore it can have detrimental effects in the brain because the brain has suffered an injury and is not healing appropriately.” \n\nLoyola Athletics also works to prevent concussions before they happen. Athletic trainers conduct a prevention program with each team at Loyola to educate the student-athletes at the start of every year, according to Oshikoya.\n\nPoints covered in this program include the signs and symptoms of concussions and how to tell if they or a teammate has a concussion, Oshikoya said. The student-athletes are also given NCAA provided paperwork that describes concussions and issues to look for concerning head injuries. \n\nAlong with the student-athletes, coaches also receive educational information based on NCAA regulations so they can identify if their players may have suffered a concussion, Oshikoya said. \n\nThese education programs are tailored to each team based on their proclivity to have concussions happen to student-athletes while in play. \n\n“The program for the soccer teams who head balls and have closer contact with athletes is a lot different,” Oshikoya said. “That’s different than the golf team, where very rarely competitors come to battle with each other.” \n\nAt Loyola, concussions occur most frequently with the men’s and women’s soccer teams, men’s and women’s volleyball and men’s and women’s basketball, according to Oshikoya. However, he said concussions can happen to any student-athlete, both on and off the field in their day to day life. \n\nConcussions aren’t as frequent within Loyola Athletics as other common injuries such as ankle sprains. Concussions across all teams at Loyola average about every six to eight weeks for a total of about two to three concussions every semester, according to Oshikoya.\n\nIn terms of prevention and treatment of concussions, it varies from student-athlete to student-athlete. \n\n“Every concussion is different for every person,” Oshikoya said. “It just depends on how each and every person reacts.”\n\n(Visited 145 times, 4 visits today)\nNext Story", "pred_label": "__label__1", "pred_score_pos": 0.973853588104248} {"content": "Modelling the formation of ultrafine eutectic microstructures during additive manufacturing\n\nNyomtatóbarát változatNyomtatóbarát változat\nPhD típus: \nFizikai Tudományok Doktori Iskola\nPusztai Tamás\nEmail cím:\nMTA Wigner FK\ntudományos tanácsadó\nTudományos fokozat: \nMTA doktora\nVirosztek Attila\nEmail cím:\nBME TTK Fizika Tanszék / MTA Wigner FK\negyetemi tanár / tudományos tanácsadó\nTudományos fokozat: \nMTA doktora\n\nOur computational materials science group have been modelling solidification processes for more than 15 years. In our everyday work, this usually means setting up phase-field and phase-field crystal models which result in partial differential equations that can be solved numerically. Most often we do this by our own simulation codes that we run on our CPU or GPU-based computer clusters.\n\nMost problems we investigate are connected to the microstructure formation during solidification, i.e., the nucleation and the subsequent crystal growth. Because of its key role in determining the final properties of the matter, understanding and controlling microstructure formation is of fundamental practical importance. The job of the PhD student to be recruited is also connected to this subject area. He/she will be involved in the work related to an EU-NKFIH project, which aims at the phase-field modelling of the microstructure formation in eutectic alloys during laser additive manufacturing (3D printing). Due to the extreme heating and cooling rates characteristic to laser melting, eutectic pattern formation takes place at an ultrafine scale, resulting in the improved mechanical properties of the solid. But, on the other hand, these conditions challenge phase-field models, which are traditionally applied to solidification problems at less extreme environments.\n\n\nFor further information on our group, see\n\n\nMSc in materials science or statistical physics\ngood English\ncomputer and programming skills, preferably C and/or C++, Python, CUDA or OpenCL for GPU programming\nmotivation and interest in the research work\n\nMunkahely neve: \nMTA Wigner FK\nMunkahely címe: \n1121 Budapest, Konkoly-Thege M. út 29-33.", "pred_label": "__label__1", "pred_score_pos": 0.518271803855896} {"content": "Novel Covid variants spreading more in some states: CCMB study\n\nA few novel variants of coronavirus are spreading more in some states in India and there is emerging evidence that the N440K mutation is spreading a lot more in southern states, says a study by the Centre for Cellular and Molecular Biology (CCMB).\n\nCCMB Director Dr Rakesh Misha said on Friday that closer surveillance is needed to properly understand the spread of N440K.\n\nIn a recent publication, scientists from CSIR-CCMB presented an exhaustive analysis of over 5,000 coronavirus variants in India and how they have evolved over the course of the pandemic\n\n\"The novel variants that are worrying many countries globally, have been identified with only a low prevalence in India so far. These include the variants with immune-escape E484K mutation and the N501Y mutation with higher transmission rate. However, their apparent low prevalence might be simply because not enough sequencing has been done,\" said Dr Misha, who is corresponding author on the study.\n\nHe believes that more coronavirus genomes need to be sequenced across the country to accurately identify the emergence of these and other new variants.\n\nThe study also finds that a few novel variants are spreading more in some states of India. \"We now have emerging evidence that N440K is spreading a lot more in southern states. Closer surveillance is needed to understand its spread properly. Accurate and timely detection of new variants that may show greater infectivity or worse clinical symptoms, including immune escape, will be extremely important to preempt disastrous consequences,\" said Dr. Mishra.\n\nAccording to CCMB, the takeaway of this comprehensive work is that due to the natural process of mutation, variants will keep emerging. The best way to control the potential damage is to exercise extensive genome surveillance and take measures to prevent the spread of new variants as and when detected. While vaccines may be very helpful, the social vaccine of masks, hand-hygiene and physical distance is the most effective weapon we have against this pandemic.\n\nThe first patient of Covid-19 in India was identified on January 30 in Kerala. Over the past year, the genome of the coronavirus SARS-CoV-2 has evolved as it transmits through its human hosts. Scientists from CSIR-CCMB have been at the forefront of sequencing and analysing its genome in India.\n\nThe authors of the latest study explained how different coronavirus variants gained prevalence in India during the last one year. One of the variants, called the A3i had mutations that were predicted to make its spread slower. The study confirms that it was overtaken by the globally prevalent A2a variant, carrying the D614G mutation, by June 2020.\n\nThe A2a variant has remained in global dominance for the major part of the year 2020. The recently discovered variants in many countries have raised concerns because of their mutations in the Spike protein, that makes the coat of the virus and come in contact with the human cells.\n\n\"The Spike protein is required for binding to the receptors on human cells. Mutations in this protein can help the virus in some cases. It can increase the viral transmission rates by enhancing its affinity to human receptors. Some of these coronavirus variants can also be immune-escape, and cause reinfection. Our immune systems cannot identify them from previous infections because of the changes in their protein structures,\" says the study.\n\nThis paper documents the Spike mutation landscape of SARS-CoV-2, showcasing the ones that have emerged with high prevalence in the country and abroad. \"Spike protein mutations have implications in Covid-19 surveillance and management, vaccines, therapeutics, and the emergence of reinfections. We need to have a focused approach towards monitoring the virus mutations. India has not been sequencing SARS-CoV-2 isolates to full capacity, having deposited only about 6,400 genomes so far. The Indian government's initiative of INSACOG, which aims to sequence 5% of all positive cases, should soon address this,\" concludes Dr Divya Tej Sowpati, the co-corresponding author.\n\n\"The success in the development and administration of vaccines is promising but other non-therapeutic prevention measures, such as masks and physical distancing, will still prove to be the most effective in curbing further spread of the disease. Lesser spread of the virus also decreases the scope for emergence and accumulation of harmful mutants,\" said Dr Surabhi Srivastava, the lead author of the study.\n\nMore news\n\nRelated News", "pred_label": "__label__1", "pred_score_pos": 0.9992215037345886} {"content": "Question: Is A Higher Cap Rate Better Or Worse?\n\nWhy is a higher cap rate riskier?\n\nThe more likely the chance that asset could stop producing income and the lower chance of appreciation, the higher the cap rate.\n\nThat means you would get a higher return for a “riskier” investment..\n\nWhat does 7.5% cap rate mean?\n\nFor example, if an investment property costs $1 million dollars and it generates $75,000 of NOI (net operating income) a year, then it’s a 7.5 percent CAP rate. Usually different CAP rates represent different levels of risk. Low CAP rates imply lower risk, higher CAP rates imply higher risk.\n\nWhat cap rate is a good investment?\n\nFor example, professionals purchasing commercial properties might buy at a 4% cap rate in high-demand (and therefore less risky) areas, but hold out for a 10% (or even higher) cap rate in low-demand areas. Generally, 4% to 10% per year is a reasonable range to earn for your investment property.\n\nDoes higher cap rate mean higher risk?\n\n\nWhat does 5% cap rate mean?\n\nIf the company earns $1 million in earnings in a given year, this is a 5% yield on the $20 million investment. Stock investors normally refer to this investment as a 20-multiple, but real estate investors referred to this as a 5% cap rate. The formula is one divided by the multiple= the cap rate.\n\nIs Cap rate the same as ROI?\n\nCap rate measures the rate of return on rental property based on NOI before financing expense. … ROI measures the total return of an investment factoring in leverage. ROI for the same property will vary depending on how it is financed, while property cap rate stays the same for every buyer.\n\nWhat is a bad cap rate?\n\nBeyond a simple math formula, a cap rate is best understood as a measure of risk. So in theory, a higher cap rate means an investment is more risky. A lower cap rate means an investment is less risky.\n\nIs 7 cap rate good?\n\nThe property with the 7% cap rate is a better fit for an investor that’s willing to take more of risk. But with risk, often comes reward. Though less stable, this property will have higher upside potential for appreciation.\n\nWhat is the 2% rule?\n\n\nIs 8% a good cap rate?\n\nThe 8% cap property may be a good fit for an investor that’s willing to take more of a gamble and risk. It might have a better upside as well, but is less stable.\n\nWhat is a good cap rate for hotels?\n\nWhat kind of cap rate should you look for?Property TypeAverage Cap RateMultifamily (urban)5.20%Multifamily (suburban)5.49%Hotel (urban)8.01%Hotel (suburban)8.55%4 more rows•Nov 16, 2020\n\nWhat is a good cap rate percentage?\n\naround four percentA good cap rate hovers around four percent; however, it is important to differentiate between a “good” cap rate and a “safe” cap rate. The formula itself puts net operating income in relation to the initial purchase price. Investors hoping for deals with a lower purchase price may, therefore, want a high cap rate.", "pred_label": "__label__1", "pred_score_pos": 0.908149003982544} {"content": "Question: What Caused The Most Deaths In Ww2?\n\nWho was responsible for the most deaths in ww2?\n\nthe Soviet UnionIn terms of total numbers, the Soviet Union bore an incredible brunt of casualties during WWII.\n\nAn estimated 16,825,000 people died in the war, over 15% of its population.\n\nChina also lost an astounding 20,000,000 people during the conflict.\n\nJune 6 will mark the 70th anniversary of the D-Day Invasion of Normandy..\n\nWhat war caused the most death?\n\n\nWhat weapon has killed the most in history?\n\nThe most powerful nuclear weapon ever used offensively was Fat Man, a roughly 20-kiloton plutonium device detonated over Nagasaki, Japan on August 9, 1945. The blast, seen here from Koyagi-jima, killed up to 40,000 people immediately, with at least as many more deaths to come from the lingering effects of radiation.\n\nWhat is the deadliest weapon in history?\n\n7 Deadliest Weapons in HistoryMaxim machine gun. World War I: German infantrymen. … Nuclear weapon. first thermonuclear weapon. … Shock cavalry. … Greek fire/napalm. … Rifle. … Submarine. … Biological weapons.\n\nWhat has killed the most humans in history?\n\nWars and armed conflicts with highest estimated death tolls of 100,000 or moreEventLowest estimateHighest estimateWorld War II60,000,000118,357,000Three Kingdoms36,000,00040,000,000Mongol conquests30,000,00057,000,000European colonization of the Americas8,400,000138,000,00047 more rows\n\nWhat was the main cause of death in ww2?\n\n\nWhat weapon killed the most in ww2?\n\nTop 10 Deadliest Weapons of World War IIMesserschmitt Me 262. The Messerschmitt Me 262 was the world’s first jet-powered fighter aircraft. … The 88mm Gun. … The Mk 2 Grenade. … Avro Lancaster Bomber. … The M1 Garand Rifle. … The T-34 Tank. … The MG 42. … Katyusha Rocket Launcher.More items…•\n\nWho were the most feared soldiers in ww2?\n\nSS-Obersturmbannfuhrer Otto Skorzeny was one of the most celebrated and feared commandos of World War II. Daring operations such as the rescue of Italian fascist dictator Benito Mussolini and missions behind enemy lines during the Battle of the Bulge made him known as “the most dangerous man in Europe.”\n\nWhy was China so weak in ww2?\n\nWeak central government, lack of modern industrial base, various levels of corruption. Chinese troops when trained and decently equipped performed well. Who proposed the WW2 policy of defeating Germany first before focusing on Japan?\n\nWhat year is World War 3?\n\nThroughout the war that spanned from 1914–1918, the world witnessed many events, including: Germany fighting on two fronts — Belgium and France on the west, Russia and Romania on the east. Revolution in Russia brought on by economic hardship and poverty in 1917. The Arab Revolt against the Ottoman Empire.\n\nWhat is the longest war in history?\n\nIberian Religious WarThe longest continual war in history was the Iberian Religious War, between the Catholic Spanish Empire and the Moors living in what is today Morocco and Algeria. The conflict, known as the “Reconquista,” spanned 781 years — more than three times as long as the United States has existed.\n\nDid more people die in ww1 or ww2?\n\nWorld War One lasted more than 4 years but about 16 million people died. That’s even more, but it’s nowhere near 80 million – and World War Two only happened 20 years later.\n\nWhy did so many Chinese died in World War 2?\n\nAccording to Rummel, “This democide [i.e., death by government] was due to a morally bankrupt political and military strategy, military expediency and custom, and national culture.” According to Rummel, in China alone, from 1937 to 1945, approximately 3.9 million Chinese were killed, mostly civilians, as a direct …\n\nHow many American soldiers died in World War II?\n\n407,000 AmericansSome 360,000 Union soldiers died in the Civil War. Another 407,000 Americans were killed in World War II.\n\nHow many German soldiers died in World War II?\n\nThe German Red Cross reported in 2005 that the records of the military search service WAS list total Wehrmacht losses at 4.3 million men (3.1 million dead and 1.2 million missing) in World War II. Their figures include Austria and conscripted ethnic Germans from Eastern Europe.", "pred_label": "__label__1", "pred_score_pos": 0.9997245669364929} {"content": "Question: Who Won World War One?\n\nWhy did Germany lose ww1?\n\nGermany failed to succeed in World War One because of three main reasons, the failure of the Schlieffen plan, nationalism, and the allies’ effective use of attrition warfare.\n\nThe failure of the Schlieffen plan caused Germanys plan to fight a two front war almost impossible..\n\nWhat was the worst war in history?\n\nthe Second World WarWorld War II (1938-1945) – With a death toll between 40 and 85 million, the Second World War was the deadliest and worst war in history. Experts estimate with such a high death toll, about three percent of the world’s population in 1940 died.\n\nWhat did they call World War 2 during the war?\n\nFrom what I heard from my grand parents, they called WWII “the war” (la guerre) or “the second war” (la deuxième guerre) and WWI “the first war” (la première guerre).\n\nWhat ended World War One?\n\nJuly 28, 1914 – November 11, 1918World War I/PeriodsGermany had formally surrendered on November 11, 1918, and all nations had agreed to stop fighting while the terms of peace were negotiated. On June 28, 1919, Germany and the Allied Nations (including Britain, France, Italy and Russia) signed the Treaty of Versailles, formally ending the war.\n\nDid we win the first World War?\n\nOn 11 November 1918, the guns fell silent and World War One came to an end. This year, we remember 100 years since this happened. … Germany and its allies knew that they had to launch a big offensive if they were to win the war before too many US troops arrived, as they were a very powerful nation.\n\nWhat year was World War 3?\n\n\nDid Germany win or lose World War 1?\n\n\nCould Germany have won ww1?\n\nIf Italy had joined the Central Powers in 1914, it is likely that Germany would have won World War 1. Much is made of the two front war that Germany fought in World War 1, with France and Britain on one side and Russia on the other. … An Italian invasion of France in August 1914 would have split French forces.\n\nHow did World War 1 change the world?\n\nOn 11 November 1918, the guns fell silent and the war came to an end, but its impact was felt for many, many years after. World War One changed the world in ways that nobody could have imagined. … New weapons and technologies were developed and used that led to more destruction than any war had seen in the past.\n\nWhen did the 2nd World War ended?\n\n\nHow did World War 1 start?\n\nThe immediate cause of World War I that made the aforementioned items come into play (alliances, imperialism, militarism, nationalism) was the assassination of Archduke Franz Ferdinand of Austria-Hungary. … When Russia began to mobilize due to its alliance with Serbia, Germany declared war on Russia.\n\nWhen did World War 1 end and who won?\n\nWith its allies defeated, revolution at home, and the military no longer willing to fight, Kaiser Wilhelm abdicated on 9 November and Germany signed an armistice on 11 November 1918, ending the war. World War I was a significant turning point in the political, cultural, economic, and social climate of the world.", "pred_label": "__label__1", "pred_score_pos": 0.9383774995803833} {"content": "A courtyard is 25 meter long and 16 meter board is to be paved with bricks of dimensions 20 cm by 10 cm. The total number of bricks required is \n\nA. 20000\n\nB. 23000\n\nC. 25000\n\nD. 26000\n", "pred_label": "__label__1", "pred_score_pos": 0.7376293540000916} {"content": "For example, a set of intercultural communication, such as alltheweb , dogpile, metacrawler, and vivisimo simultaneously submit your work even for commercial purposes, as swales 1989:46 rightly points out, using a chart page 73 to know something about herself, then the researcher was explicitly reflected upon, as an example, laajalahti s 2010 study focused on the integration of immigrants into finnish and the sam- ple, an item analysis with individual t tests and other tests. Organ ization the or unwieldy; however, the word astonishing, armamentarium, compendium, or conundrum in one way of revealing the purpose of writing centers can help elucidate some of the teaching of phrase and articu- late the traffic was unusually heavy. Makiko s reflections very much con- cerned with procedures that use or trafficking prohibited drugs including drug paraphernalia or abuse of prescription drugs chemicals or coming to grips with ways to push the boundaries. Government agencies typically have a unique flavor. If computers do not have many friends left. B facial expressions are the province of solitary scientists or teams. A multimodal approach to the office. Curiosity killed the cat. Although students with special flair in architecture and radiography, neither of them by mobilising a variety of causes of airport delays. The story 17a piece that will extend across all units in one group of participants to move from the gayle morris sweetland center for education and classism has been cooking. You can use when writing for publication can be employed in various non-anglo-american rhetorical tra- ditions, such as these, the simple transcrip- tion of academic genres in a thesis should exhibit the same discipline, it appears that the earth revolves present around the school and students are not addressed whether or not we loose, lose, loss flexibility. The manuscript usually goes through a long time because my paycheck this week is more than remind them of possible alternatives. Returning to wideman s quote in order to enhance students academic prose and insufficiency of their experiences or opinions of authors in his national alphabet accompanied by in ter est ing question, but a view to gaining employment, both reading and often subversive, but they rarely are.\n\nocr gateway gcse biology past papers   examples for persuasive essays  \n\nFundamentals of academic writing level 1\n\nHow would a doctor or a book that will make a essay autobiographical to how write and distinction between your version of relief theory. Other editors, perhaps not to overestimate the importance and necessity must, have to, should, ought, need to, or meeting, the italian city-states. My friends were, however, looking her friends as characters occur through different than it did the student to the object of the philippine national police as approved ny the secretary of education, london, chaired by mary q. Smith the above exceptional cases where there are ways in which language use at the overall structure of lessons or texts. Then quote the material, the title of your own words. The majority of readers, especially when we arrive. He likes to get rid of my argument here for a crispy hundred dollar bills. If you do not expect to find his or her, the latter is concerned with teacher identity development 2. Languages esl issues 3. Community orientation 5. The change in intellectual interpretation, argument and evidence in the missing information; to identify known old and new informa- tion about the topic and provide empowering experiences for the dependent variable. Class, codes and control: Theoretical studies towards a broader context of a sentence that names the same information and skills that promote a deeper understanding of the english teacher repeating to us that faulkner considered himself a writer, as I write it as a really good review of anthropology, annual review of. In the same instru- ment are not found the money so they do so positively and without cropping. narrative essay about losing a friend\n\nWellington is the best examples and illustrations represents essay autobiographical and write to how a marked increase in learning control beliefs, e self-efficacy, and f test anxiety, as measured by grammar-identification knowledge. Literacy in higher education,. 5. Grounds for classifications: Prototypicality in answers in an ac know ledg ments, two pos si ble that at least passable quality in online elective courses, as well as examining these two made an exciting combination a mixture of epistemic subjects typically marks either cycle boundaries or places of methodological development, which has an everyday meaning speed but in this is done will vary, largely according to their school and how learning works, and unethically sourced, flexible labor. This paper discusses examines investigates xxx. At this level of probability. The four portraits discussed here are contributors who are procrastinators panicking because we don t require thought haven t even opposed to main title- subtitle arrangements and to seek a scientific-communication career 269 t hose reviewing the data collected and graded to evaluate propositions by balanced argument though this kind can give all students work and another idea within a discussion of some of the spelled- out term. Correct: He isn t even opposed to more than 12 years to replace phrases with adjectival and adverbial prepositional phrases serve key modi- fying words are the verbs followed by a philippine school. Collec- tively, the editor s decision manager-in-training s duties add s to get the answers 77 of bilinguals or foreign and difficult to tell your readers what you told them. Wishes, would, have 2. D. 31. If you have read in their li or in a tribe. The dockhands had unloaded the warehouse already as early as this. These drinks vary widely from journal articles, preferably in your field and ability to adjust to rapid changes in technology, financial resources, and the fractures of power and domination see street et al. That writing is taught is different from an editor who can blame them. Secondly, he has time to reflect their planned future movement through those initial transition issues whittaker, 2005, although ever-expanding class sizes and statistical tests sometimes it uses the committee will announce the decision. Most of these respondents.\n\nenglish comprehension test papers   sample thesis introduction for information technology  \n\nThesis statement on online vs traditional education\n\nHow to write and autobiographical essay and things we can do to save the earth essay\n\nAfter she started to write about one s language identities, and experiences. Smit, u. 2010. Intensive collaboration is becoming commonplace at many academic assignments and tasks john m. Swales & christine b. Feak press, grammar teaching and learning spaces being created in 2010 during a longi- tudinal ethnographic investigation into the differences between finnish and related fields are jointly doing research. Genetic psychology monographs, 831, 13-68. Cambridge, ma: Mit press. Some care needs to be lexically and syntactically complex items e. G. Therefore, however, for the program applied for and subject specialists. However, in the backyard by, for example, the data analysis the researchers who have been drawn from smiths willie henderson 183 their little huts or moveable houses, smithing, skin dressing, dressed skins being presented or perceived niceties of language. From this perspec- tive, time and sometimes ineffective because the text and or a continuation of this structure to your readers ability to recognize that in linguistics, tone can refer to characteriza- tions and states, including new state that-which-is not-yet 2008, p. 19. Examples of extremely, possibly overly cautious claims in the following questions were contingency questions, limited to school, home, and to write are fidgety and reluctant: Can t I just saw the black hills rising in the. English-only initiatives at the time allotted. After considering the reports and writing skills as useful had excellent course grades. Finding and working with him to eat sweet cherries2 bakers put them in what category would yours fit.\n\njackson pollock abstract expressionism essay   dissertation of delay of in construction  \n\nSenior thesis sample and how to write and autobiographical essay\n\nView this post on Instagram\n\n5 more recently, it essay autobiographical to how write and has been a central core. Fyc is typically stored in artificial lakes evaporates during dry and hot summers passive participial phrase derivation may come from the general disposition to truck, barter and exchange in the creation of sites like creative about assessing writing 325 aspects by which readers might not be responsible for the match, the conveys precise meaning relevant to report. Louis, mo, usa, march 2001. So students learn to produce if it is best when the acts punishable under articles 298, 309, 302, paragraph 3, it is. In contrast, physical capital comprises buildings, machinery, tools, and so on. What were the outcome of the data represent exactly what I have to be clear when you were writing the introduction of an rp from the topic or evidence supporting the personal and less effective lower holistic scores. Think back to aristotle, consists of the course.\n\n\nbelieving in yourself essay\n\nA classification of this type of sc that is needed are empirical studies have examined the patients ; separation of skills and tasks john m. Swales & christine b. Feak press, til for instance. A teacher of writing and not data. Furthermore, it is impor tant part. 29 formatting your reference collection. This chapter explains how to present an area where similar per- centages of children s development is one in the number n and percentage of gnp from 13. Bilingual education in the academy. Gender the findings and their perceptions of text see also chap. To clarify matters, there appear to be aware of the science ra corpus. An academic literacies and ac lits. 1 identifying logi- cal fallacies can be used with any type of technology, or research questions guided my study: 1. What is the group constitution and the participants toward the irreverent, and that writing is integrated into chapters iv, v, vi, vii, and viii, one chapter ten contains five paired examples of move 2 and 6 show. What types of writing in context appreciably retarded as the practical implementation of this book. Currently, nacep has accredited 98 dual-en- rollment writing programs, see kristine hansen and christine adam s learning log.\n\nEvery question is quite likely to cause disease virus strains each selected strain into separate batches of fertilized eggs to amplify the amount is calculated by using the proposed solutions note that there may have practical importance, during viewing. Source: Beverly j. Irby corwin press books are john bean and maryellen weimer s engaging ideas: The professor sent me explicit instructions about how your study will be kept to a cademic w riting for g raduate s tudents the differences in the future. Time place - who went on for further technological advances, include: - date. Columbia. Therefore, socrates is mortal. 341-357. In brief we could reasonable expect from your perspective, is there any important assumptions underlying the other features such as engineer- ing, the bird.\n\nconcept ideas for essay   mla research paper title page", "pred_label": "__label__1", "pred_score_pos": 0.819955587387085} {"content": "Download App\n\nFollow us on social media for latest updates\nFacebook: | Telegram: Join @fztvseries\n\nAmerican Housewife TV series, shows/cartoon,anime,magma/Documentaries - MobileTVshows\nAmerican Housewife (in TV)\nLast Updated: 25 Feb, 2021\n\nSeason 3 - Episodes\nReport Missing Episode\n\nThis is a live series. The upcoming episode\n(Season 5 - Episode 11 - The Guardian)\nwill be aired on Mar 03,2021\n\nAmerican Housewife\nAmerican Housewife - S03E01 - Mom Guilt (High MP4) (WEBM) (Aired: 2018-09-26)\nAmerican Housewife\nAmerican Housewife - S03E02 - Here We Go Again (High MP4) (WEBM) (Aired: 2018-10-03)\nAmerican Housewife\nAmerican Housewife - S03E03 - Cheaters Sometimes Win (High MP4) (Aired: 2018-10-10)\nWhen Katie's mom, Kathryn (Wendie Malick), comes to town, Katie and Kathryn encourage the kids to make less than favorable decisions: Oliver cheats in shop class and Katie helps him try to get out of it, while Kathryn reassures Taylor that she doesn't need to go to college.\nAmerican Housewife\nAmerican Housewife - S03E04 - Enemies: An Otto Story (High MP4) (WEBM) (Aired: 2018-10-17)\nAnna-Kat runs for the Green Chair position in the school election against Chloe Brown Mueller's daughter, which results in Katie and Chloe turning their kids' election into a feud of their own. Meanwhile, Greg becomes concerned that Taylor's new friend Pierce is trying to steal her away from Trip, causing Greg to intervene and scheme to prevent it.\nAmerican Housewife\nAmerican Housewife - S03E05 - Trust Me (High MP4) (WEBM) (Aired: 2018-10-24)\nAmerican Housewife\nAmerican Housewife - S03E06 - Body Image (High MP4) (WEBM) (Aired: 2018-10-31)\nAmerican Housewife\nAmerican Housewife - S03E07 - The Code (High MP4) (WEBM) (Aired: 2018-11-07)\nKatie learns that the pin code the Ottos use for everything spells out Greg's ex-girlfriend's name, and retaliates by dragging out old gifts from past boyfriends. Meanwhile, the kids' current love lives take a hit as Taylor and Trip argue over her relationship with Pierce; and Oliver and Gina's relationship goes south when they both apply for a ballet scholarship that only one of them gets.\nAmerican Housewife\nAmerican Housewife - S03E08 - Trophy Wife (High MP4) (WEBM) (Aired: 2018-11-28)\nKatie lands the perfect pawn to play on the insecurities of the Westport housewives when she convinces a hot young trophy wife named Harper to volunteer as room mom for Anna-Kat's class, but she quickly shifts gears when Harper rejects Anna-Kat's idea for movie night. Meanwhile, Greg enlists the help of the kids to get Katie's mom, Kathryn, to take an interest in someone other than herself.\nAmerican Housewife\nAmerican Housewife - S03E09 - Highs and Lows (High MP4) (WEBM) (Aired: 2018-12-05)\nOliver and Taylor stumble through their love lives, making Katie miss the spontaneity and unpredictability of being young and in love. Meanwhile, Kathryn's plan to soothe Oliver's heartbreak backfires when she tracks down an old boyfriend, Dan, and he is not as she remembers. At the same time, Anna-Kat makes strides at school when Franklin is stuck at home with the chickenpox, forcing her to make a new friend.\nAmerican Housewife\nAmerican Housewife - S03E10 - Saving Christmas (High MP4) (WEBM) (Aired: 2018-12-12)\nKatie strives to keep her long-separated parents apart when her father arrives in time to surprise the Otto family for Christmas. Anna-Kat does her best to help Trip win Taylor back but has a hard time getting past a very persistent Pierce. Meanwhile, Oliver thinks no one will remember him as the mask-wearing villain in the school's production of \"The Nutcracker\" but quickly takes center stage when a series of mishaps damages his costume.\nAmerican Housewife\nAmerican Housewife - S03E11 - The Things You Do (High MP4) (WEBM) (Aired: 2019-02-05)\nGreg's insistence on doing the family's taxes prompts Katie to take matters into her own hands; Oliver and Anna-Kat join forces in an attempt to win a popular radio contest; Taylor finally sees Pierce's true colors.\nAmerican Housewife\nAmerican Housewife - S03E12 - Disconnected (High MP4) (WEBM) (Aired: 2019-02-12)\nKatie plans a \"friend date\" in hopes of reconnecting with Taylor; Greg attends self-help seminar with Oliver; Anna-Kat takes extreme measures to secure her place as Katie's favorite child.\nAmerican Housewife\nAmerican Housewife - S03E13 - Mo' Money, Mo' Problems (High MP4) (WEBM) (Aired: 2019-02-19)\nKatie encourages Greg to splurge on an overnight getaway; Oliver's attempt at a rebellious streak ends in disaster; Taylor comes to the realization that she needs to step up and be a better big sister\nAmerican Housewife\nAmerican Housewife - S03E14 - Baby Crazy (High MP4) (WEBM) (Aired: 2019-02-26)\nKatie panics when Greg is hit with a bout of baby fever; Taylor tricks Oliver into helping her.\nAmerican Housewife\nAmerican Housewife - S03E15 - American Idol (High MP4) (WEBM) (Aired: 2019-03-19)\nGreg enlists Oliver and Anna-Kat's help to drum up new recruits for the Westport Historical Guild; Katie does her best to support Taylor's dreams of becoming the next \"American Idol.\"\nAmerican Housewife\nAmerican Housewife - S03E16 - Insta-Friends (High MP4) (WEBM) (Aired: 2019-03-26)\nKatie feels left out when Greg becomes fast friends with the newest member of the Westport Historical Guild; Oliver fears Cooper is ditching him when he sees on social media that Cooper lied about his weekend plans.\nAmerican Housewife\nAmerican Housewife - S03E17 - Liar Liar, Room on Fire (High MP4) (WEBM) (Aired: 2019-04-09)\nWhen Katie forgets Greg's birthday, she attempts to make up for it by pulling together a last-minute dinner party.\nAmerican Housewife\nAmerican Housewife - S03E18 - Phone Free Day (High MP4) (WEBM) (Aired: 2019-04-16)\nIn order to avoid buying Anna-Kat a cellphone, Katie makes a pact with the girls that she and Taylor can go an entire day without using their phones; disappointed with Greg's advice, Oliver seeks the guidance of an old friend.\nAmerican Housewife\nAmerican Housewife - S03E19 - Grandma's Way (High MP4) (WEBM) (Aired: 2019-04-23)\nWhen Katie gets sick, Greg enlists Kathryn's help in taking care of the kids; Taylor gets a taste of her own medicine when she tries to help an unruly Katie.\nAmerican Housewife\nAmerican Housewife - S03E20 - Field Trippin' (High MP4) (WEBM) (Aired: 2019-04-30)\nFearing she's spending too much time at the office, Katie volunteers to chaperone Anna-Kat's school field trip; Greg takes a creative approach to parenting when he catches Taylor and Oliver in a lie.\nAmerican Housewife\nAmerican Housewife - S03E21 - Locked in the Basement (High MP4) (WEBM) (Aired: 2019-05-07)\nAnna-Kat becomes best friends with Chloe Brown Mueller's daughter; Greg encourages Oliver to be honest with his girlfriend and not hide his passion for ballet.\nAmerican Housewife\nAmerican Housewife - S03E22 - The Dance (High MP4) (WEBM) (Aired: 2019-05-14)\nWith the kids away at the school dance, Katie and Greg look forward to a romantic evening alone; Anna-Kat is crushed when the boy she likes doesn't ask her to the dance; Oliver begins to panic when the town psychic's predictions begin to come true.\nAmerican Housewife\nAmerican Housewife - S03E23 - A Mom's Parade (High MP4) (WEBM) (Aired: 2019-05-21)\nFrustrated by the lack of appreciation for all she does, Katie decides to leave the family to fend for itself.\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9711996912956238} {"content": "How counselling can improve your life\n\nEvery individual has a go-to coping mechanism for handling problems and stress in life. While some of these mechanisms fall under the healthy spectrum, some people have unhealthy coping mechanisms. Sometimes, life can be overbearing. Introducing another form of help can go a long way. One way of seeking help is by speaking to a professional.\n\nThe benefits of counselling\n\n\nSelf-awareness can change everything. Counselling can help you to become self-aware. Without self-awareness, you exist in a confused fog of living without a sense of direction or purpose. When you undergo counselling, you can look at the world around you from the inside out.  Suddenly, things start to make better sense, which brings you clarity and better understanding. This places you in a place where you can consider change.\n\nYou are more aware of your thoughts\n\nMore than 60,000 thoughts go through your mind each day. Many of these thoughts are repetitive and thus have an impact on how you live your life. Counselling makes it possible for you to be more aware of your thought processes and how they work to shape your choices and moods. Once you become aware of your thoughts, you can manage them. This way, you are in command of your thoughts, how you respond, and how you choose to allow them to affect your mood.\n\nLiving in the moment\n\nPeople suffering from anxiety and depression spend most of their time worrying about the future or dwelling on the past. Counselling helps you to live more in the present without worrying about the future or replaying past events. When you live in the present, you are more connected to the world, and you are calmer and at peace.\n\nUnderstanding your behaviour patterns\n\nWhen dealing with life issues, different people handle stress in different ways. Some people adopt unhealthy eating habits, others become alcoholics, while others go to the extremities of drug abuse. Counselling offers you a safe space to explore personal fears and how they lead to your behaviour patterns. This brings about positive change.\n\nImproved relationships\n\nYour relationships become strained when you are going through a hard time. Unknowingly, you push people away by your actions and habits. Counselling can make you more aware of your strained relationships and help you to repair them. Counselling will also help you to be mindful of toxic relationships and help you move on from them.\n\nYou are braver and less anxious\n\nWhile the world may seem like an antagonising and fearful place, counselling can help you heal from your life experiences. This way, your experiences in life will have a lesser impact on how you view the world and life. Counselling helps you to create a personal safe-passage to fulfilment and happiness.\n\nLoving yourself and other people\n\nOnce you have healed from your past and have overcome your fears, you can open yourself more to allow others in. You also accept yourself as you are. You understand that no one is perfect, and you learn to fall in love with yourself.\n\nCounselling is the way to prosperity, happiness, peace, joy and contentment.", "pred_label": "__label__1", "pred_score_pos": 0.9149265885353088} {"content": "India vs England: Ashwin, Kohli take India's lead past 400\n\nParth Dhall\n·2-min read\n\nIndia vs England: Ashwin, Kohli take India\nIndia vs England: Ashwin, Kohli take India\n\n15 Feb 2021: India vs England: Ashwin, Kohli take India's lead past 400\n\nTeam India made a terrific recovery after losing five wickets in the morning session on Day 3 of the ongoing second Test against England.\n\nThe likes of Virat Kohli and Ravichandran Ashwin shared a 96-run stand to take India past 200 in the second innings.\n\nMeanwhile, the hosts have claimed a lead in excess of 400 runs.\n\nHere is the session report.\n\nSession: How did the session pan out?\n\nResuming the session at 156/6, Kohli and Ashwin battled it out against the English bowlers.\n\nThe duo went on to complete respective fifties as India maintained their dominance.\n\nWhile Ashwin made perfect use of the sweep shots, Kohli preferred playing more with the straight bat.\n\nHowever, the latter was trapped lbw by Moeen Ali in the 66th over.\n\nAt tea, India finished at 221/8.\n\nAshwin: Ashwin shows his all-round skills\n\nAll-rounder Ashwin continues his dream run in Test cricket with the bat and ball.\n\nAfter taking a historic five-for (5/43) in the first innings, Ashwin fired an astonishing fifty.\n\nThis was his first 50+ score in Test cricket at home since December 2016 and first anywhere since August 2017.\n\nEarlier, he broke plenty of records as England were bundled out for 134.\n\nFact: Ashwin scripts this feat in Test cricket\n\nAshwin has now struck a fifty and picked up a five-wicket haul in the same Test joint-third-most times (6) along with Sir Richard Hadlee. Meanwhile the top two on the list are Ian Botham (11) and Shakib Al Hasan (9).\n\nKohli: Kohli makes a counter-attacking 62\n\nIndian captain Virat Kohli showed terrific resistance in the second innings against the English bowlers.\n\nHe was on the charge against the spinners, playing a counter-attacking knock on the tricky Chepauk wicket.\n\nKohli struck a timely half-century, his 25th in the format.\n\nHowever, he missed out on a much-awaited ton, getting dismissed by Mooen (62) for the second time in the Test.", "pred_label": "__label__1", "pred_score_pos": 0.7967943549156189} {"content": "Kashmiri Shawl weavers pioneered the labour movement\n\nThe Kashmiri shawl industry workers agitated against the cruel taxation system and employment conditions at least 21 years before the protests of the Haymarket labour movement. They were the pioneers of industry-wise workers’ rights movements in the world.\n\nAt least 28 shawl weavers who were put to death by the forces of the ruling Maharaja Ranbir Singh on 29 April 1865 at Zaldagar area of old Srinagar city. Those unarmed shawl weavers were protesting against the cruel taxation of the exploitative working conditions.\n\nEvery year, people in Kashmir, particularly the businesses related to Pashmina businesses, commemorate the death anniversary of those innocent weavers. They observe April 29 instead of May 1 as the Labour Day. It was the day when hard working shawl weavers marched through the streets of Srinagar’s old city against the cruel tax policies imposed on them by the Dogra regime. The shawl weavers of Srinagar were compelled by the circumstances of turbulent working conditions, unfair wages, excessive taxation and a ban on weavers who wanted to leave Kashmir valley.\n\nThe world labour movement was pioneered by protestors of the Haymarket Riot (also known as the “Haymarket Incident” and “Haymarket Affair”) that occurred on May 4, 1886. The Haymarket protester gathered to near Chicago’s Haymarket Square and turned into a riot after someone threw a bomb at police. At least eight people died as a result of the violence that day.\n\nAlmost 21-years before the Haymarket incident, Kashmiri shawl industry workers on April 29, 1865, protesting against high taxes. At least 28 workers lost their lives and hundreds were injured.\n\nThe origin of shawls in the world can be traced back more than 700 years. However , the shawl industry introduced by Zain-Ul-Ahadin in mid 14th century who backed the art of weaving in the Kashmir valley.\n\nBy the 16th Century the Kashmir shawl industry was an old and well-established one. King Akbar encouraged and promoted the manufacture of shawls in Kashmir. He also presented a gift of Kashmir jamawar shawl to the Queen of England. Fabrics Bernier description of shawls in the late 17th Century, leaves us in no doubt that he is referring to the same pashmina shawls that became famous as Kashmir (Cashmere) Shawls. It became a highly fashionable and stylish garment when Empress Josephine famously received Kashmir shawls as gifts from Napoleon.", "pred_label": "__label__1", "pred_score_pos": 0.505475640296936} {"content": "Can I Divorce My Wife For Not Sleeping With Me In India?\n\nCan court Force husband to stay with wife in India?\n\nNEW DELHI: The Supreme Court has said that courts cannot force a husband to “keep his wife” as it asked a man, a pilot by profession, to deposit Rs 10 lakh as interim maintenance for his estranged wife and upkeep of their son.\n\n“We cannot force a husband to keep his wife.\n\nIt’s a human relationship..\n\nWhat is the minimum time to get divorce in India?\n\nHow much time does it take? Divorce by mutual consent can be obtained within six months, but no petition in such a case can be filed within first year of marriage. There also has to be gap of six months between the first and second motions. The court can waive this cooling off period in some cases.\n\nWhat is the new divorce law in India?\n\nNew Delhi: Cutting off waiting period for divorce by six months under the Hindu Marriage Act, the Supreme Court on Tuesday ruled that divorce can be granted without the mandatory 18-month period of separation between the couple.\n\nCan divorce be denied in India?\n\nMadurai: The Madras High Court Thursday ruled that the refusal of a spouse to cooperate in a conjugal relationship after 16 years of marriage cannot be grounds for granting divorce or dissolution of the marriage.\n\nWhat happens when one spouse doesn’t want a divorce?\n\n\nCan a man divorce his wife in India?\n\n\nHow can you get a divorce if spouse won’t sign?\n\n\nWhat are the rights of a wife in a divorce in India?\n\n\nWhy would a judge deny a divorce?\n\nA judge will typically only deny an uncontested divorce if there are procedural matters that haven’t been done properly, something is unclear or confusing, or something is not in the best interests of the child.\n\nIs marriage a contract in India?\n\nUnlike western countries where marriage is taken to be a contract between husband and wife, in India marriage is considered as a religious alliance of a man and a woman for life and thus a prenuptial agreement is legally not valid under the Hindu Marriage Act in India, however it is governed under the Indian Contract …\n\nCan I divorce my wife if she refuses?\n\nUnlike if you issue on the grounds of your spouses’ adultery or two years separation, you will then not need their active cooperation to progress your divorce. … You will simply need to satisfy the Court that they have received the papers.\n\nIs sexless marriage grounds for divorce in India?\n\nIndia: Denying sex to spouse a long time mental cruelty, ground for divorce, High Court says. New Delhi: Putting an end to a nine-year-old marriage, the Delhi High Court has reiterated that denying sex to the spouse for a long time, without sufficient reason, amounted to mental cruelty and is a ground for divorce.\n\nWhat cases husband can file against wife?\n\n1.No- There is no such provision , where husband can file a case against his wife simply for assaulting. But you can move a complaint against her ,if harassment from her continued. Whereas as , i indicate above mother in law can file under D.V. Act.\n\nCan you deny someone a divorce?\n\n\nWhy is my husband not interested in me sexually?\n", "pred_label": "__label__1", "pred_score_pos": 0.9129387140274048} {"content": "In the name of fighting COVID-19, Harris County (Texas’s largest county) health officials announced a plan that includes randomly knocking on doors to collect blood samples. “Teams of health workers wearing yellow vests will make their rounds from Nov. 15 through Dec. 15, from 8 a.m. to 5 p.m.” reports the Houston Chronicle.\n\nTheir plan, they say, is to better determine how many people have been infected with Coronavirus by conducting antibody tests.\n\nMore from the Houston Chronicle:\n\n\nBeginning Sunday, health workers will visit randomly selected homes and ask residents to answer questions and provide blood samples.\n\nHumans produce antibodies, proteins in the immune system, to fight infections from viruses and other pathogens. It can take days or weeks for antibodies to develop following exposure to the coronavirus, and it remains unclear how long they remain in an individual’s blood.\n\nThe Houston region has recorded 236,704 COVID-19 cases since the virus arrived here in March, according to a Houston Chronicle analysis, but health officials estimate this is only a fraction of the total number of infections.\n\nAccording to the local ABC affiliate, the Health Department has the following goals:\n\n • Understand what caused COVID-19 to spread in certain areas.\n\n • Understand how COVID-19 has spread in Harris County.\n\n • Understand how COVID-19 transmission and infection rates differ among communities.\n\n • Determine the effectiveness of containment strategies that have been utilized during the pandemic.\n\n • Identify the percentage of Harris County residents infected with COVID-19 with no symptoms.\n\n • Improve public health messaging to help stop the spread of COVID-19.\n\nNothing about these numbers suggests justifying a door-to-door campaign. Nothing. 1% fatality rate. ONE PERCENT. Particularly considering Houston is the fourth largest city in the country.\n\n\nDonations tax deductible\nto the full extent allowed by law.", "pred_label": "__label__1", "pred_score_pos": 0.9957060813903809} {"content": "Need for light rail and a little history lesson on collusion – a reprise from 2012\n\nThe following was written in 2012, but it provides a history lesson of why we need to dig deeper to understand sources of information. There is a reason collusion is such an ugly term. It should be noted cities are sharing ideas to make traffic flow more easily to lessen congestion and smog.\n\nWith the needs for better traffic planning in larger cities to alleviate congestion, diminish smog and let people move more freely, there has been a growing push for light rail lines. These lines are electrified trains that run adjacent and across traffic at crossing lights. They have tended to be more economical to build and run than the major subway and elevated train lines serving our largest cities. With the environmental concerns over global warming and the need for less fossil fuel usage, you would think these developments would be a slam dunk.\n\nUnfortunately, projects like these are fighting uphill battles as part of the budget cuts and cost estimates. Unlike an operational budget issue, these capital projects are building assets that would benefit the communities and address the issues noted above. There is no doubt we need the best cost estimates possible to make these things happen and we should blend federal, state and local money to do so, but we should not be making this so hard. For some reason, the conservative right has latched onto this issue and for the reasons noted above have been more adamant against their development. The skeptic in me thinks there is more to this than just the budget issues, as we want to continue our focus on driving rather than riding. To me, a vibrant transit system is needed for a cosmopolitan area. Otherwise, we are just creating a congested, environmental problem.\n\nWhat is interesting to me is a significant number of cities in the US had electric rail systems before they were destroyed and replaced by buses and cars in the 1930’s and 40’s. What is disturbing is how this came about. I would like to say this was done with good stewardship, but the unfortunate reason is several companies with a vested interest in the outcome, colluded to monopolize the bus industry and replace the destroyed electric rail or trolley system with their buses and cars. In 1949, after the fact, GM, Firestone Tires, Standard Oil of CA, Phillips Petroleum and Mack Trucks were found guilty of “conspiring to monopolize” the bus industry and using buses and cars to replace the electric trolley system that companies they owned had bought up. This conviction was upheld in appeal.\n\nWikipedia has a good summary of how these companies went about it. Search on “General Motors Conspiracy” and you can pull it up.  In fact, GM set in motion this plan to “motorize” the mass transit system dating back to 1922. And, if you look at the names of the fellow conspirators, you will note that two are oil/ gas companies, one is a tire company, one is a maker of buses and one is a maker of cars and trucks. These motorized road vehicles companies and fuel companies conspired to destroy an electric, rail based system that relieved congestion and smog. Even if their motives were altruistic, this would not seem like good transit planning.\n\nWhy do I mention all of this now? Two reasons. First, I want people to know why it is important to look beneath the source of information and data on any issue, but especially those which include oil and gas. There is too much money at stake and, as noted above, stranger things have happened. Just today, it was announced the President is supporting fracking to my chagrin, but is wanting the chemicals used by the oil/ gas developers to be disclosed. Yet, the industry lobbyists have battled down this ruling to be they only need to disclose this after the fact. So, they will be permitted to frack and only disclose the toxic chemicals that could leak into the water supply afterwards. To be candid, we need to move away from fossil fuels as quickly as we can. The best way to do that is to drive less with those oil/ gas-powered vehicles. Electric rail systems are a key part of that strategy.\n\nSecond, I mention this as conservatives are asking for fewer regulations and the elimination of some agencies. I worked in business and can say with certainty – businesses need to be regulated – it is that simple. If we don’t they will take advantage of situations to maximize short-term profit. The collusion verdict noted above was too late. Industries pay lobbyists a great deal to take the teeth out of regulation. The EPA has been fighting an uphill battle for years. We actually need the EPA to do more, not less. And, nowadays industries need only contribute to campaigns to share their viewpoints and push their desired outcomes. It costs too much money to run for office. This makes the lobbyists work easier.\n\nIn closing, I would ask that we all try to understand the stories beneath the news. When we see people against ideas that seem to be for the greater good, we should ask  ourselves why and look into it. Otherwise, we will miss the more elegant solutions and may avoid finding out who is more interested in an outcome than others. Not everyone is altruistic.\n\nPay me now or pay me later\n\nSeeing what is transpiring in Texas with the lack of advance planning, it reminds me of painful history lessons. There is an age old problem in governing and public service. When things hit the fan, it is often due to problems that were not fixed due to budgets and were left to linger.\n\nPoliticians are good at blaming others and asking how can you let that happen? They tend to overlook their role in the process. Here are a few real life examples:\n\nWhen some one in a social worker’s care has a horrible episode, the fact the social worker is serving 160 people versus the best practice 16 to one does not get enough consideration as a root cause. Think about it, due to budget cuts, one social worker is serving 10X the number of people which is ideal. That is drive by social work, not counseling.\n\nWhen a train wrecks on an old trestle bridge, the fact the bridge has never been fixed and is only patched up does not get enough consideration as a root cause. When the next train derails, read the fall out from politicians and dig beneath the finger pointing at the actual causes, not who did what.\n\nWhen Katrina devastated New Orleans, people forget the Army Corp of Engineers said the levees could not stand a direct hurricane hit a few years before. Nothing was done about it and the levees failed. We should also remember the Houston area has flooded twice with one-hundred year hurricanes that were four years apart.\n\nAnd, In Texas, the vulnerability of their independent electricity system is a festering problem. So, when the system is overwhelmed like it has been with the icy storms, it fails.\n\nAvoiding disasters by planning is a rare commodity in governance. No one wants to pay for it. Plus, so-called leaders do not get sufficient credit for pre-planning like they should. They get more credit for fixing a problem later after the fall out, if they ever get around to it.\n\nAs we speak, we have thousands of car and train bridges in need of repair, we have antiquated electrical grids, we have poor water piping (think Flint), etc. When the Olympics was not awarded to Chicago a few years ago, it was due to our aging infrastructure, even then.\n\nA good example of pre-planning occurred in my home city of Charlotte. The city built an Intermodal distribution facility which was placed on the property of the international airport. Easily accessible to this facility are train and truck distribution centers and highways for trucks. They took advantage of shipping in/ out by plane, train and truck.\n\nThis is the kind of planning that is needed with infrastructure improvements. The fixes have to be holistic in evaluating the problems and hopefully make the process better in the end.\n\nIce on Fire – a reprise\n\nNote, the following post was written two years ago, but still serves as a reminder of the progress we have made and need to make to address our climate change problem.\n\nI encourage people to watch the excellent HBO documentary called “Ice on Fire” on concerns over climate change and remedial actions underway that should and can be leveraged. The documentary is produced and narrated by Leonardo DiCaprio, but the most impactful voices are the scientists, inventors and trendsetters who are seeing dividends from their actions and investments.\n\nTo sum up, we have two major problems facing us – too much carbon in the air along with a growing concern over methane as it is released from beneath melting ice caps and frozen tundra, on top of the venting from natural gas sites. The title comes from researchers lighting methane leaks on fire as it is released from melting ice covered waters. The scientists note with data that it is quite clear man is causing the hastened uptick in temperatures as we leave our carbon fingerprints in the atmosphere.\n\nThese are major concerns, but we are not sitting still. Significant efforts are underway. They can be categorized as putting less carbon in the air and capturing more carbon from the air. To avoid a novel, I will touch on some of the ideas, but please do deeper dives and watch the documentary airing now.\n\nStop putting carbon in the air\n\nWe must hasten the move to renewable energy. The costs are more on par and less, in some cases, than fossil fuel energy production. Wind and solar energy are growing at accelerated rates. One CEO noted, the technology is here to make this happen even more than it already is. Here in the US, California gets 25% of its electricity from solar and Texas gets 16% of its electricity from wind energy.\n\nYet, a very promising start-up off Scotland is tapping tidal energy. There is a company producing electricity today with an offshore platform with two turbines turned by the tides to generate electricity. I have written before about this group as they use existing technologies to harness the sea. Their success is gaining notoriety around the world, as it appears to be replicable.\n\nTwo other ideas also help with both recapture and restricting release. The first is reusing depleting biowaste (such as dying trees, plants and compost) in the soils to grow crops and future trees and foliage. The biowaste holds water better, maintains top soil and is straight out of nature’s guidebook.\n\nThe other is growing more kelp offshore as it captures carbon like sequoia trees and can also be used as a food source for livestock. Feeding cattle kelp is not a new approach. Feeding cattle is important as it greatly reduces the gases released by animals and preserves more carbon capturing grassland.\n\nCapture more carbon from the air\n\nThe documentary spells out several natural ways to capture carbon and a few technological ways. On the former, here are a few ideas:\n\nMaintain forests, especially those with large sequoias, which are huge carbon eaters. There are several places that are nurturing huge forests, but they note we need more of these efforts. We need to be mindful to replace what we cut, but keep some protected forests off limits to cutting.\n\nAnother example is to replenish mangroves that offer buffers to oceans. In addition to offering protection against storms, they also are natural born carbon eaters.\n\nAnother effort is to grow more urban farms. These farms are usually more organic, but in addition to absorbing carbon in urban areas, they perpetuate a farm to table concept that reduces transportation fumes. Reducing auto fumes is a huge concern of cities around the globe.\n\nThe next idea is more compex, but it requires the growing of more shells in the ocean. The dusts off the shells creates “ocean snow” that settles to the bottom and absorbs carbon. The idea is to spread a very small amount of iron in the ocean to cause more shells to grow.\n\nThe more technological solutions are designed to pull carbon out of the air. There are two approaches – one is to extract carbon and store it safely underground. The other is to pull it out and reuse it through artificial photosynthesis. Both of these options need more description than I am giving them. I prefer the more natural ways, but all of the above, is a necessary strategy at this late hour.\n\nThe scientists have concerns, but they do offer hope. The uncertainty of the ice-covered methane release gives them pause. They did note the methane release from accidental leaks from fossil fuel is visible from space and reduceable with some effort.\n\nAnother concern is the well-funded activity behind climate change deniers. A Wyoming rancher scientist standing in front of a visible, leaky methane cap said it plainly – they know this stuffs hurts kids more than adults. If someone came into my home to hurt my kids, it would be over my dead body. So, why is it OK to allow this?\n\nAnother scientist was less colorful, but equally plainspoken. He said fossil fuel executives perpetuating climate change denial should be tried in The Hague for crimes against humanity. Yet, as the costs have declined, the profit of creating carbon is becoming less palatable than the profit of reducing carbon in the air. People need to know these market forces exist today and not stand for future unhealthy energy creation.\n\nFinally, if you cannot convince a climate change denier that we have a problem, ask them a simple question – if costs were not an issue, would you rather your children and grandchildren breathe methane from vented natural gas or drink coal ash polluted water or have carbon and methane neutral solar, wind or tidal energy? Guess what – costs are not much of an issue anymore and, in an increasing number of cases, less for renewables.\n\nThe Frackers – the Outrageous Inside Story of the New Billionaire Wildcatters (a reprise from 2014)\n\nThe following piece is a reprise from a post in 2014. It is important to read the concerns of six years ago about this industry. Fortunately, the renewable energy industry continues to make huge strides.\n\nI recently completed a very interesting book written by Gregory Zuckerman, a Wall Street Journal reporter called “The Frackers – the Outrageous Inside Story of the New Billionaire Wildcatters,” published by Portfolio/ Penguin Press in 2013. Zuckerman is also author of “The Greatest Trade Ever.” I highly recommend this book as it is as entertaining as it is informative, in multiple ways. It gives you a clearer picture of the risks and rewards of fracking, but also shows how hard it is to both glean the fossil fuel you are seeking and to be so highly leveraged in debt as you do.\n\nThe successful fracking companies, usually bucked the odds and the more measured risk takers in the larger companies who had much more capital to withstand some of the risk. As a result, even the ones who had success, usually failed before, after and sometimes during their success, due to the need to be land rich which came at a highly collaterized cost of debt. When some went public, they also had to contend with impatient shareholders. These wildcat developers made and lost huge sums of money, oftentimes with their egos getting in the way of knowing when to stop.\n\nZuckerman does an excellent job of telling the story of people like George Mitchell, who has been called the “father of shale fracking,” Aubrey McClendon, Tom Ward, Harold Hamm, Charif Souki, Robert Hauptfurher and Mark Papa, among countless others who were key to the success of gleaning natural gas and oil from places that were perceived too difficult to crack. He also defines why methods and strategies are so secretive, as companies will follow suit to leverage off your success. These men and their companies, Mitchell Energy, Oryx Energy, Chesapeake Energy, Continental Resources, Chenier Energy and EOG Resources, were truly the path finders in this process called fracking. They led the US to become more energy independent, yet in so doing, understated or overlooked the risks that came with those rewards.\n\nAs I read this entertaining book, I found myself convinced of a preconceived notion, that the main mission of these guys was to make a lot of money, as well as proving others wrong. Some even took delight that their hypothesis was true, even if they had not benefitted as greatly as the company that bought out their rights. Yet, what I also found this lust for money also was an Achilles Heel, and there seemed to be less consideration of what fracking was doing to the environment. They were more content to let the problems be handled by someone else and often belittled the complaints and complainers.\n\nZuckerman addresses these concerns from the frackers viewpoint earlier in the book, yet does devote an Afterword to the environmental risks that are real. But, before doing so, he notes that George Mitchell, late in life continued to buck convention. Per Zuckerman, Mitchell “gave millions to research clean energy even as he, along with his son and Joe Greenberg, invested in a new shale formation in Canada.” But the quote that interests me most, is by Mitchell who responds to those who contend how safe fracking is:\n\n“Fracking can be handled if they watch and patrol the wildcat guys. They don’t give a damn about anything; the industry has to band together to stop isolated incidents.”\n\nThis dovetails nicely with a well-worn phrase I gleaned early on. Even if fracking were safe, it is only as safe as its worst operator. Mitchell, the father of fracking is more than acknowledging the bad operators. His son Todd, who was also in business with his father, said “his father’s work will have had a negative impact on the world if it forestalls progress on renewable energy, instead of giving innovators time to improve wind, solar and other cleaner energy sources.”\n\nLet me close with an even-handed quote from Zuckerman, which frames the issue, yet also notes a caution. He answers the question “Is fracking as bad as activists say, and what will its impact be as drillers continue to pursue energy from shale and other rock formations?” His conclusion is as follows:\n\n“The short answer: Fracking has created less harm than the most vociferous critics claim, but more damage than the energy industry contends. And, it may be years before the full consequences of the drilling and fracking are clear.”\n\nWith my reading I would agree with both of these sentences, yet not place the fulcrum in the middle of the scale. I would be more on the side of vociferous critics as the evidence continues to mount and as non-industry scientists are revealing issues. The massive water usage, the seepage of the poisonous slickwater fracking fluid into the environment, the particles that are blasted into the atmosphere which are causing breathing difficulty, and the degradation to the surrounding environment just to get vehicles and equipment into frack are compelling arguments by themselves.\n\nBut, the great caution in his last sentence is where we need to focus. “And, it may be years before the full consequences of the drilling and fracking are clear.”This is the bane of any environmental group fighting for people and the environment. Oftentimes, it takes years for the true damage to be seen and felt. Some show up in shorter order, yet when the companies making the money do not want to stop a mission, they can afford to fight people who cannot clearly make a connection. The developers want to settle with each complaint at minimal outlay and move on. Unfortunately, the people exposed to the problem, remain in harm’s way.\n\nThe Precautionary Principle – revisiting a relevant post from 2012\n\nWe are at a crossroads in our country and on our planet. We must all become better stewards with the environment and address these issues today and in the future. The business side of energy retrieval and production along side the development of mass-produced products made out of or enhanced by petro-chemicals have placed our planet in a precarious position. For the longest time, these industries have been able to delay addressing issues citing the data is not conclusive or shows causality. Proof or true causality oftentimes takes thirty years or more. In the interim, the data can show a high correlation that an activity is leading to a problem. For those who did not take statistics, correlation means things rise and fall together.\n\nIn the US, we place the burden of proof on the Environmental Protection Agency (EPA) and like agencies who govern other areas of commerce. Other countries have a variation of the EPA.  In some countries that burden resides with the developer to show that something is not toxic or harmful to others. Several scientists and concerned citizens got together at Wingspread in Canada to discuss these issues. One of the tenets of that meeting can be summed up by a statement made by Bradford Hill, a medical statistician and inventor of the randomized clinical trial, back in 1965:\n\n\nIn short, we should not wait to do something later if the evidence is telling us something is amiss now. With toxic chemicals, for example, if you wait to fully prove something is bad, the damage is already done. Especially when you are dealing with children who are still developing and breathe in more than adults.\n\nThe group at Wingspread developed the following Precautionary Principle\n\n\n“The process of applying the Precautionary Principle must be open, informed and democratic and must include potentially affected parties. It must also involve an examination of the full range of alternatives, including no action,” noted Dr. Sandra Steingraber in her book “Living Downstream – An Ecologist’s Personal Investigation of Cancer and the Environment.” In this book and her second book called “Raising Elijah” she notes industry has tended to stiff arm science to continue to conduct practices that are harmful to the environment and people. The democratic process she references is hard to conduct, when so much money is at stake.\n\nIf I have not scared you enough, I am reading a book now called “Water – The Epic Struggle for Wealth, Power and Civilization” by Steven Solomon. If you like history, you will love this book. I have not finished it, so I don’t know the ultimate punch line. Yet, through history it has been shown that great civilizations have risen and fallen by their ability to manage the water and sewage supply. The data he has shown thus far is very compelling. Water is our dearest resource next to air. Without either, we cannot survive on this planet. If we do not protect what is happening to either we are destined to fail as country, planet and people.\n\nI use fracking as a good case in point. The data is highly correlated that fracking leads to toxins in the water and air of the surrounding area. Yet, I believe and have said this in letters to the editor and to politicians, set that aside for now. Fracking takes a huge amount of water out of the water supply and it cannot go back as it is poisoned with the fracking chemicals. We can ill-afford to waste our water on this environmentally destroying  retrieval process. Water is very dear and the droughts and fights over water supply will continue to show this. The developers say the same things they have said for years on other issues – you cannot prove there is a causal relationship between fracking and the toxins. Yet, we can prove you are taking a lot of drinking, bathing and sewage water away from people. And, the data is very compelling on the toxins as well.\n\nThis brings us back to the Precautionary Principle. We should reverse the equation. OK, Mr. Developer, since you want to make a ton of money and pay off people to frack beneath their land, YOU prove that fracking is NOT toxic to people or environment before you dig one hole. You prove that this is the best use of our dear water supply. And, you keep testing after you start digging. I have known many developers in my day and the last thing they want to do is hold off on doing something. They want to make their money and leave the problems for someone else. If we reverse the equation, they will have to do more homework beforehand and throughout. That is a good thing.\n\nThe dilemma we face as a planet is there is a lot of money to be had in developing energy and chemical products from fossil fuels. As a result, the industry supports a lot of politicians with a lot of money and lobbying efforts. Yet, we must diminish our reliance on fossil fuels, we must understand the impact of petro-chemicals on our environment and people and we must put the burden of proof that an activity is not harmful on the purveyor of that activity beforehand and throughout. In the meantime, if anyone says we should do away with the EPA, for you, me and our children, tell them that is the dumbest idea you have ever heard and would be poor stewardship of our planet. Please help advocate the Precautionary Principle as well.\n\nCommercial electric vehicle company opens microfactory near Charlotte in Rock Hill, SC\n\nPer WCNC, a television news station in Charlotte, a report called “Electric vehicle microfactory promises to bring 240 jobs to Rock Hill” was aired. Rock Hill is part of the Charlotte Metro area just across the border in South Carolina. Here are the salient points per a MSN write-up of the piece:\n\nArrival, a company that produces electric vehicles around the world, announced Tuesday its plans to build a ‘microfactory’ in York County. The factory is part of a $46 million investment in the region and is Arrival’s first American microfactory. The company expects to bring 240 new jobs to the Rock Hill area. \n\nArrival, which was found in London in 2015, creates zero-emission vehicles for commercial transportation. The South Carolina facility will utilize a new cell-based assembly method to produce vehicles, rather than the traditional assembly line. This will give Arrival the flexibility to produce any vehicle in its portfolio at the factory, according to a press release from the company.”\n\nThis is just more evidence of where future growth will occur. It is good to see our area embracing new technologies to make zero emission vehicles. The train (or in this case, the bus) toward renewable energy has left the station. Communities that are embracing this will see more growth and better cost models going forward, as well as help the environment.\n\nThis is is not an outlier story. Solar energy jobs have averaged annual double digit growth and dwarf coal energy jobs. Wind energy is also growing in the US, especially in the plain states with Iowa, Kansas and Oklahoma combined getting more than 1/3 of their electricity from wind energy. And, Tesla has branched into electric delivery trucks on top of their cars.\n\nThese news stories should be more widely communicated to show the path forward is being taken by states, cities and companies.\n\nThe Appeal – a book with relevance today\n\nWith the pandemic, I have been catching up on the many unread books we still have on our shelves. Recently, I finished a book John Grisham published in 2008 called “The Appeal,” that was #1 on The New York Times bestseller list back then.\n\nEven though it is twelve years old, the theme is relevant today. Without giving too much away, a married couple law team in a small town in Mississippi win a court case for their client against a company who had been proven to dump poisonous waste chemicals that made it into her community’s water supply. Their client lost both her husband and son to cancer as did many others in the county. She was awarded $41 million including punitive damages.\n\nWhile others awaited to file suit, the verdict gave them reason to hope. The verdict was expected to be appealed, so no money traded hands. The CEO of the holding company for the chemical company decided to be proactive at the behest of a senior Mississippi Senator known for his wealth amassed through lobbyist funding. So, the CEO hires a secretive consulting firm whose expertise will help to unseat a less-friendly (to companies) judge running for reelection. Most of the $8 million fee is off shore and never declared.\n\nThe consulting firm recruits a young lawyer, with a young family and no baggage or judicial experience. So, he has no rulings that could be highlighted in a negative way. Once on board, they quietly fund his campaign commercials and strategy before announcing his candidacy. In essence, they use a surprise attack and overwhelm the sitting judge who thinks she is unopposed and has not raised funds.\n\nI will stop there. The scary part is how easily this could be done. People were convinced to vote for this young, photogenic judge with a nice family, not knowing he was going to severely limit liability for companies who screwed people like these voters. He was supposed to be their judge.\n\nSo, when I see the stated reasons why judges are running, it makes me want to dig further. The true reason for a well-funded campaign is money. What judge will be the most friendly to companies? I have said this earlier, whether it is a supreme court seat or appellate court or some other court, lip service is given to issues that interest the voters. But, what interests the lobbyists is counting on a reliable vote in their industry’s favor.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nTexas (28,843 MW)\nIowa (10,190 MW)\nOklahoma (8,172 MW)\nKansas (6,128 MW)\nCalifornia (5,973 MW)\n\n\n\n\n\nTwo quotes from a nice and effective public servant\n\nThe Charlotte Observer reported today that Boyd Cauble, a long time aide to many mayors of both parties passed away. Three things stand out about Cauble – he did not bring attention to himself, he was very effective working with officials in Raleigh and DC, and was a genuinely nice guy.\n\nMore than several of Charlotte’s major accomplishments can be traced to Cauble’s tireless advocacy. Rather than list such milestones, let me focus on two bookend quotes from Cauble from the article penned by Jim Morrill.\n\nMorrill writes “Boyd Cauble lived by a simple credo: ‘Just be nice to people – you’ll be amazed what will happen.'”\n\nWhen Cauble retired from the City, in an Observer article called “The City’s most influential guy you have never heard of,” he said at the time:\n\n“‘I am a firm believer that if you don’t care who gets credit, you’ll gey a whole lot of things accomplished.'”\n\nI encourage you to read these two quotes and contrast them to today’s partisan win/ lose debates that are a poor substitute for governance. All politicians (and business people or any team) from top to bottom could learn from these words.\n\nMayors from both parties lauded Cauble’s efforts. Vi Lyles, Charlotte’s current mayor and long time City leader, said “He helped bulld Charlotte.'”", "pred_label": "__label__1", "pred_score_pos": 0.5583832263946533} {"content": "\nShopping Cart\n\nSterling Silver Cufflinks, Genuine Roman Ancient Coins, with Certificate 6658\n\n\nThese Sterling silver cufflinks are set with authentic ancient Roman Bronze coins dated from 2nd to 4th Cent AD.\n\nAdvantages: These cufflinks could appeal to anyone from a student to a history buff, to people that love antiques, to anyone who appreciates beauty and historic events. They make for a great conversation piece as well as meaningful gift.\n\n- The jewelry made in the US.\n- The piece comes with Certificate of Authenticity of the Coin.\n- Workmanship is guaranteed.\n\nJewelry Maintenance:\n2. To clean use a silver cloth on the silver and avoid the coin. Absolutely NO JEWELRY CLEANERS!\n3. Best preserved in a ziplock bag.\n\nThe front of the coin is a head of then current roman emperor. The Roman Mint was established as the Temple and Factory of a Roman God named Juno Moneta. The word money is derived from this god's name. These mints relied on vast\n", "pred_label": "__label__1", "pred_score_pos": 0.7692533731460571} {"content": "Following on from the workshops we did about being resourceful with year 7 in Hitchin Boys’ School earlier in the year, this term we were looking at being resilient. We started the workshop with a challenge; the students were given a page of puzzles, sudoku, word searches etc. They were given 10 minutes to complete the whole sheet and were told there would be a countdown on the screen at the front. Little did they know that as well as the count down adding some pressure there were also distracting noises happening during the 10 minutes such as a baby crying and different sirens going off.\n\nThis was all to give us a way to talk about resilience and how we deal with and recover from distractions. We then moved on to think about different behaviours that can be helpful in us becoming more resilient. The class were split into groups. Each group had to present to the class why their helpful behaviour was so important and how we can go about doing it.\n\nResilience is such a key life skill to learn not just for school but as we journey through life. It has come up a few times already in discussions with boys that I mentor and them being encouraged to deal with some of the challenges that they are facing in a more positive way. One boy commented that ‘it was a really good workshop and helped me to have a better outlook on how I dealt with difficulties.’\n\nMr Terry, year 7 teacher, who was in the sessions with us gave this glowing report:\n\n“Yet again a superb workshop led by Paul Harris.  The boys engaged with the content through paired work and whole class discussion. This built nicely on the other workshops conducted earlier this academic year.  Thank you Paul for your continued efforts at HBS, I know the boys enjoy your input. I for one look forward to future workshops with yourself. ”", "pred_label": "__label__1", "pred_score_pos": 0.9303174614906311} {"content": "1. The endothelium has been shown to modulate the pulmonary vascular response to hypoxia in the rat. Acute lung injury is associated with loss of hypoxic pulmonary vasoconstriction and increased pulmonary vascular permeability. Similar loss of the vascular response to hypoxia is seen after ischaemia-reperfusion injury of the myocardium.\n\n2. The effects of reperfusion injury on pulmonary endothelial integrity, as shown by the albumin escape index and hypoxic pulmonary vasoconstriction, were investigated in isolated, blood-perfused rat lungs.\n\n3. Ischaemia for 0.5 h, which itself caused no increase in the albumin escape index, was followed by reperfusion for 0.25 h, 0.5 h and 1 h. Controls were subjected to 2 h of perfusion only (n = 5 in all groups). The pulmonary pressor response to hypoxia (fractional inspired oxygen concentration, 3%) was measured before and after ischaemia-reperfusion, and the dilator response to acetylcholine was measured after ischaemia-reperfusion in all cases.\n\n4. Ischaemia-reperfusion significantly increased the albumin escape index after 0.5 h (mean ± SEM, 1.40 ± 0.27) and 1 h (2.0 ± 0.30) compared with controls (0.54 ± 0.30, P <0.05 in both cases). The pulmonary pressor response to hypoxia was augmented significantly after reperfusion when compared with baseline hypoxic pulmonary vasoconstriction (change from baseline: 13.2 ± 4.63 and 22.2 ± 7.1% after 0.5 and 1.0 h of reperfusion, respectively, P <0.05). Vasorelaxation of sustained hypoxic vasoconstriction using acetylcholine was similar in both control lungs and those subjected to ischaemia-reperfusion.\n\n5. These results suggest that the pressor response to hypoxia is augmented after damage to the pulmonary vascular endothelium induced by ischaemia-reperfusion. Although this may be due to diminished release of endothelium-derived relaxing factors, the normal vasodilator response to acetylcholine suggests the phenomenon is not due to a reduction in the release of endothelium-derived relaxing factor/nitric oxide.\n\nThis content is only available as a PDF.\nYou do not currently have access to this content.", "pred_label": "__label__1", "pred_score_pos": 0.9878798723220825} {"content": "SPSS Assignment Help and SPSS Homework Help\n\nLearning Facilitator\n\nAssignments in SAP and SPSS are not designed to be a static document. In fact, assignments should be dynamic and change as necessary. It is important that you, as the learning facilitator, ensure that your employees understand this fact. You can take several steps to encourage a flexible schedule and ensure that employees can accomplish a given task on a frequent basis.\n\nFirst, evaluate your scheduling methods and ask your team members what they prefer in terms of speed and deliverability. You may find that assigning a variable number of hours per week, which are being tracked through the software, will yield far better results than simply announcing the number of hours that are available.\n\nSecond, do not allow yourself to get wrapped up in enforcing rigid scheduling requirements, because the rules that must be followed are not always effective. You must have employees that are capable of accomplishing projects at a pace that is suitable to their capabilities. You must allow for flexibility as well as efficiency in the process.\n\nThe third step is to understand that in order to achieve the best results, you need to involve your employees in the planning and decision-making process. This can be achieved in two ways. One, provide your team members with training on the use of the software, or two, engage your team in the creative process by creating a piece of content, such as a book report, that utilizes the features of the software.\n\nAs you begin to take advantage of the capabilities of the programmatic collaboration feature in SPSS, you should think about how it will benefit you. For example, some employees may be reluctant to collaborate because they fear that others will steal their ideas. You may be able to address this issue by using a collaborative editing feature, so that the ideas are actually being shared and not just edited.\n\nIt is clear that when you work in a system that has a better relationship between you and your employees, your enterprise will benefit from improved innovation and success, and the best way to achieve this is to create an environment that allows them to share ideas. So, there are some additional organizational functions that you can use to build up this ability, such as the ability to present information, and discussions of what is in your company’s future.\n\nWhen you begin to use programmatic collaboration in your organization, be sure to put in place the appropriate access controls. You must ensure that the people who need to use the features of the software are allowed to do so. Also, be sure that no one is using the software unless you specifically give them permission.\n\nTake care to make sure that each member of your team members is given proper training on the use of the software. This training must focus on user productivity, support for changes, and the software and its features. Your facilitators can also help develop the necessary skills by presenting modules that are designed to be easy to use and comprehend.\n\nSPSS Help Online is offered through the SPSS program, and it can be easily accessed through the main SPSS website. You should consider this feature a very important one, since it will enable you to receive support and guidance from your learning facilitators. While they will have to use some discretion, it is in your best interest to make sure that they are not being influenced by your employees in any way.\n\nIt is also important to make sure that your employees are allowed to use SPSS and learn more about it through program training. You will also want to make sure that you provide your team members with training in the areas of improvement, risk management, and time management, because these topics are very important in your organization.\n\nFinally, make sure that you select a business model that is compatible with your business model. SAP and SPSS enable you to provide your team members with regular training, which you can also track using the training module in SPSS. Since you can offer all of this training through the program, you can focus on the development of your team’s abilities instead of your own, which can help you increase profitability.\n\nTraining, analysis, and software are tools that the learning facilitator can use to enhance performance. For your own sake, make sure that you incorporate these techniques into your business model so that your team members will use these techniques to improve their productivity.", "pred_label": "__label__1", "pred_score_pos": 0.9634445905685425} {"content": "A religion doesn't need a real god, but a god needs a real religion.\n\nAchs Arod is a vast continents, the home to billions of people. Religions are many and varied, ranging from the monotheistic and pantheistic to the polytheistic. It has been proven beyond reasonable doubt that gods exist, but despite this several atheistic cults, both militant and pacifist, exist.\n\nThe largest organized religion in the known world is the polytheistic Church of Mahradia which is the dominant religion south of the Great River. The Mahradian Pantheon lists more gods by far than any other known religion.\n\nThe International Independent Theologian's Association (IITA) is not a religion as such but, as the name implies, an organization of theologians not bound to any religion. The main goal of the IITA is to identify and catalogue all known gods; it publishes and maintains a list of known gods referred to as The Official IITA Pantheon. The organization is controversial in that it denies the existence of certain well established gods, especially within the Mahradian Pantheon.\n\nThe anfylk, having been created by the goddess Anna are not actually monotheistic. They acknowledge that while they were all created by one god there are other gods out there who influence their existence, both as individuals and as a race.\n\nElves, especially the Original Elves, recognize that gods exist on Aua but still worship the great celestial being they knew in their original plane of existence.\n\nDwarves as a species do not keep with one specific religion. They generally adapt the dominant religion of their region out of convenience.\n", "pred_label": "__label__1", "pred_score_pos": 0.8956499099731445} {"content": "As healthy practices go, yoga and meditation are at the top of the Rx pyramid. The symbol “Rx” stands for the Latin word “recipe” meaning “to take.” Rx is, of course, more widely known as a prescription. I think a more appropriate metaphor might be to “give and take” since by definition an Rx is prescribed and then taken by the patient/practitioner.\n\nI really like the recipe concept, as in, yoga and meditation are essential ingredients in the perfect recipe for healthy aging. So, in the spirit of the Rx for health, peace and longevity, I humbly prescribe a dose of healing meditative yoga today.\n\nHappy flowing and healing!", "pred_label": "__label__1", "pred_score_pos": 0.8516182899475098} {"content": "Strong emotions can cause your body to make more adrenaline, a hormone that increases your heart rate and blood pressure. Tension causes small arteries throughout your body to contract (get smaller) and may temporarily raise your blood cholesterol levels.\n\nHow you handle stress will have an affect on your body and emotional well-being. You can help manage stress by trying to reduce the causes. When you are under stress, you must take good care of yourself.\n\nTake deep breaths and release them slowly. Schedule activities at a leisurely pace. Avoid rush hour traffic and busy shopping times. Schedule time to “do nothing” or do activities that you enjoy. Take care of yourself. Attend a relaxation class, or try massage to cope with your stress.\n\nSource: Allina Health's Patient Education Department, Take it to Heart: Your Healthy Heart Guide, cvs-ah-92674\nFirst Published: 01/19/2019\nLast Reviewed: 01/19/2019", "pred_label": "__label__1", "pred_score_pos": 0.9939911961555481} {"content": "The paradox of perversity is that it is as often admired as condemned. It may be seen as a folly in defiance of facts, but also as a virtue of loyalty in the face of adversity. In sports, the determined loyalty of the fan devoted to a consistently losing team is revered rather than ridiculed. In religion, the more absurd the belief, the greater the faith that is required; the greater the faith, the more virtuous the believer.\n\n\nmore atheist quotes", "pred_label": "__label__1", "pred_score_pos": 0.9999431371688843} {"content": "Executive Summary\n\nL’Equipe faced the challenge of estimating the daily market need for printed newspapers, dealing with both excess production and shortages, leading to missed sales and high costs. BearingPoint leveraged an in-house AI and machine-learning solution, Nitro, to help L’Equipe forecast next-day demands accurately, which improved efficiency and reduced their carbon footprint.\n\nSales performance demands accurate forecasting\n\nIn an age when the press is mostly delivered in digital form, L’Equipe engages its readers in both digital and print: a strategy that contributes to their long-standing success.\n\nAlthough L’Equipe has a high, daily paid circulation, anticipating the actual demand for copies would seem to be an insurmountable challenge. Accurate sales forecasts of print editions are impeded by the fluctuating nature of sports events, as well as the influence of generic factors like weather conditions. Overestimating sales would result in papers being left unsold, creating a financial deficit; underestimating demand would lead to a shortage of copies and missed opportunities to make additional sales. L’Equipe is currently sold in approximately 25,000 vendor locations throughout France, with each retailer having allocated a specific average sales volume, adding to the difficulty of knowing the exact number of papers that need to be printed.\n\nUsing AI to transform historical data into accurate forecasts\n\nL’Equipe joined forces with BearingPoint to address the issue of sales forecasting. The in-house data science and media team leveraged BearingPoint’s own Nitro AI-driven solution, which was developed specifically for publishers.\n\nNitro is a comprehensive set of managed services that use machine learning and an AI approach to focus on print-media supply chain forecasting. The in-house team inputted vast amounts of historical data, including units sold by period, units delivered, holiday sales, and weather variations. Nitro used this information, as well as new data added every day, to produce forecasting models that predict the exact number of paper copies needed by every retail location for the following day.\n\nOptimizing the number of copies for each day\n\nL’Equipe has successfully lowered the rate of unsold units by more than 5%, cutting the number of unnecessary printed copies by approximately 2 million. L’Equipe distribution planners are now able to easily adapt to different scenarios, relating to the impact of current events on sales. The user interface allows them to make changes at all scales, including individual units, with no specific AI knowledge required.\n\nPlanning resources were reallocated to higher value activities, such as analysis of market dynamic and customer behavior. Nitro’s ability to quickly compute numerous KPIs was essential in performing these activities effortlessly.\n\nEven in the unprecedented and volatile context of the Covid-19 pandemic, planners were able to reduce damage to sales figures by using Nitro and maintaining a high accuracy in forecasting. L’Equipe’s social responsibility has grown, with Nitro playing a crucial role in reducing the newspaper’s carbon footprint.\n\n\nL’Equipe is the French market leader in sports’ press. It is famous for its extensive coverage of football, rugby, motor sports, and cycling. It is one of the country’s largest paid print publications.\n\nWith NITRO, we have an autonomous vehicle whose engine settings are optimized automatically, giving us more control. Our demand planners can fully develop their know-how and correct the projections by adjusting the forecasts made by the machine.\n\nE. Matton, Editor & Director of the print division - Groupe Amaury\n\n\nWould you like more information?\n\n\nToggle master download\nToggle search\nToggle location", "pred_label": "__label__1", "pred_score_pos": 0.7206370830535889} {"content": "Tricholoma pardinum\n\nToday we are going to talk about a type of mushroom considered one of the 20 most important toxic mushrooms in Spain. It is Tricholoma pardinum. This mushroom is known by the common name of Brown Tricholoma and has great toxic characteristics. It has been considered one of the most dangerous among all those belonging to this group.\n\nFor this reason, we are going to dedicate this article to tell you about all the habitat characteristics and possible confusions of the Tricholoma pardinum.\n\nMain features\n\nHat and foils\n\nIt must be borne in mind that when faced with a mushroom with such toxicity, you have to be very careful when collecting. The problem is that there can be confusion that makes you collect this mushroom instead of another of the genus Tricholoma. There are numerous species of this genus that are edible and quite in demand in gastronomy. However, if you are inexperienced in collecting mushrooms, it may be interesting that you go to someone with more experience or, in case of doubt, not get to collect the mushroom.\n\nIt is important to know all the characteristics of a mushroom and the small differences that may exist between them to be able to classify them correctly. In this way, we minimize the risk of making mistakes when collecting. We are going to begin to describe this mushroom to learn more about its appearance both outside and inside.\n\nHe has a hat that can be 15 centimeters in diameter. This makes it a fairly large hat compared to other mushrooms in the same group. This hat has shades between silver brown or grayish. These colors are depending on the age and maturity in which it is. When this specimen develops and reaches the adult stage we can see that it has a very small mamelon in the center. We can use this small mamelon in the center as a differentiating characteristic of this species with respect to another.\n\nWhen Tricholoma pardinum specimens are young, they have a curved hat edge. The surface of said hat has some scales arranged like tiles. Between the mamelon in the center and the scales on the surface, we can get to differentiate this hat from other species of the Tricholomas group.\n\nIts blades are quite clear white, although sometimes we can find them yellowish. It has a more sinuous and low-cut shape and they are tight between them. A differentiating feature of the sheets is that they have a variable length. These are usually all sheets that are uniform in size and tightly packed together. In this case, we find sheets of varying length between them. The spore, where the spores develop, is white.\n\nPie and meat\n\nAs for the foot, it has a white color with shades of ocher and a stormy and fibrous surface. When it is said that it has a stormy surface it is that it has some darker green colors. It can measure between 8 and 10 centimeters in height and about 2.5 centimeters in diameter. This makes it more or less in good proportion to the hat and its size. The meat of the foot is white or grayish in color, depending on the specimen and has a mealy smell. This mealy smell must also be taken as a type of main difference between this species and others of the same genus.\n\nLastly, its flesh is white in color and also has a floury smell with a mild taste. Although the flavor is mild, we cannot allow ourselves to get confused with this species as it has high toxicity. Later we will analyze its consequences.\n\nTricholoma pardinum habitat\n\nIts habitat is in coniferous and mixed forests. In order for them to develop correctly, they need a large amount of humidity and they usually grow in groups. We can also see them grow alone although they are far from each other. Mainly, they are found in a mountain habitat with more humid characteristics.\n\nThe time of growth and development is during the fall. Depending on the rainfall that has occurred in the summer and the temperatures, it can develop sooner or later. If the summer has had milder temperatures and high rainfall, we can start to see it almost in late summer and early fall. On the other hand, if the rains take longer to arrive and the temperatures are higher (as happens every year), it can cause their late growth.\n\nIt is a fairly toxic immortal mushroom if consumed. Therefore, it is necessary to know a lot about its morphology and possible consequences. The negative effects on health after consuming this mushroom are the following: first it begins with stomach pain, nausea and vomiting. Later, it ends up reducing the ability to breathe until, finally, it causes death.\n\nConfusions of Tricholoma pardinum\n\nWe are going to know the main species of mushrooms that can lead to some confusion when collecting this mushroom. Almost all or all are from the same group. The first of them is Tricholoma terreum. The main difference with this mushroom is that it is smaller and does not have the scales on the hat. As we have mentioned before, both the mamelon in the center of the hat and the scales can serve as differentiating characteristics between species.\n\nAnother possible confusion is Tricholoma portentosum. It is another of the mushrooms of the same group that can lead to some very frequent confusion. The main difference also occurs with the scales of the hat. And it is that these scales located on the hat of both adult and young specimens can help differentiate the mushroom from the rest.\n\nIt is known that many mushrooms change their morphology as they develop. In order not to be wrong with the collection of this mushroom, it is important to know all the aspects that it has during its life cycle.\n\nI hope that with this information you can learn more about the Tricholoma pardinum mushroom.\n\nRelated posts\n\nDeja una respuesta\n\n\nBotón volver arriba", "pred_label": "__label__1", "pred_score_pos": 0.982753336429596} {"content": "Home > News\n\n\nBigger and Heavier Dinosaurs Should have Existed\n\nJan. 25, 2021\n\nDinosaurs were the dominant species on land during the Mesozoic era, with a wide variety of species and different body types. Years of popular science have given the public a basic idea of what a dinosaur was: big, far bigger than modern land animals. People have always imagined that in the ancient world, anything was possible, and that bigger and heavier dinosaurs 'should' have existed. However, new research could see these ancient creatures \"shrink\".\n\nAt the Field Museum in Chicago, USA, paleontologists have unveiled the largest land animal ever to have existed. The 100-million-year-old reconstructed skeleton of the dinosaur, known as Patagotitan mayorum, was too large to fit in any of the special galleries and was placed in the middle of the hall. The long neck all the way down to the long tail was about 120 feet (36.5 metres) long in total, and scientists had previously estimated that the animal weighed over 70 tonnes, but this figure has now been reduced.DinoWalk Science & Technology Inc can be manufacture real life size fiberglass dinosaur replicate.\n\nReal Life Size Fiberglass Dinosaur Replicate\n\nBased on fossil estimates of Patagotitan mayorum from several different ages, paleontologist Alejandro Otero and colleagues have reduced the behemoth's weight to 57 tonnes in a new study. Although \"tonnes\" may not be intuitive to humans who weigh in kilograms, an 18 per cent reduction in body weight is indeed a significant change. One possible explanation is that the new study found that the vertebrae of the lizard-footed animal were filled with air sacs to keep them light, so that the method of estimating its weight had to be readjusted and the total weight calculated would have been smaller than before. And estimates of the dinosaur's record full length of nearly 36 metres may also be problematic, as there was no complete skeleton.\n\nIncomplete dinosaur fossils, evolving technology and a paleontological focus on giant dinosaurs have all contributed to the ongoing search for the largest terrestrial animals. Despite the fact that many dinosaurs grew large (the famous Tyrannosaurus rex was 40 feet long and weighed 9 tons), the largest class of dinosaurs actually belonged to the lizard-footed group, which ate mainly plants. These four-legged herbivores are easily recognisable by their tiny heads, long necks, bulky bodies and gradually tapering tails. Dinosaurs like Brontosaurus and Leontosaurus have conveyed the standard image of these herbivores to museum-goers for the last century or so. However, even these huge animals were not the largest of all.\n\n\nDinoWalk Science & Technology Inc. was established in 2008, Located in Zigong city Sichuan province of China.Has a great reputation for being a sincere manufacturer.Specialized in not just robotic dinosaurs,also a manufacturer of fiberglass dinosaur fossils,scientific products, fiberglass statues, lanterns serials,landscape art design, Festival foam sculpture ,etc.\n\nDino Walk Science & Technology Inc.", "pred_label": "__label__1", "pred_score_pos": 0.7098026871681213} {"content": "logo com4\n\nRotary Kiln Design Calculation\n\nCalculating kiln volume by marc ward.From the novemberdecember 1996 issue of clay times.To determine the amount of heat btus required for your kiln to reach a desired temperature in a certain time frame, you need to know your kilns volume.\n", "pred_label": "__label__1", "pred_score_pos": 0.9718737006187439} {"content": "Did 'WandaVision' Fans Spot An Error Afoot? A Marvelously Brief Investigation.\n\nVision may need to ... reboot.\n\nAs an enormous critical success, there’s no doubt “WandaVision” has started off on the right foot. Though it seems Vision could be missing that foot entirely.\n\nWhile the shocking cameo at the end of the fifth episode of “WandaVision” was pretty much all anyone could talk about last week, some fans are shifting their focus to the moment right before that scene.\n\nIn the earlier scene, when Vision (Paul Bettany) confronts Wanda (Elizabeth Olsen) about possibly controlling the sitcom world they live in, it seems there’s other trouble afoot. Namely, Vision’s foot is missing.\n\nTikTok user @wildimmigrant was among those to point out Vision appears to be missing his extremity in the scene. A recently uploaded video of the moment has more than 70,000 views thus far.\n\nThe scene was also brought up on Twitter:\n\nAfter checking the episode, it does appear Vision’s foot disappears for a couple seconds around the 31:27 mark. So what’s the deal? Is it a mistake with CGI? Or is it a clue, hinting at how things are always just a bit off in “WandaVision”?\n\nDo we need to wait for the other shoe to drop?\n\nWhen looking at the moment, one answer does seem to have legs. “WandaVision” director Matt Shakman has already talked about the show’s use of practical effects to make it feel more authentic to the sitcoms it emulates. Though it does seem like the shoe is missing, it’s more likely that Vision’s levitating was done practically with wires, and Bettany’s foot is just tucked perfectly behind his leg. \n\nPerhaps adding to the illusion that the foot is missing, the previous shot of Vision in the air shows his foot at a different angle:\n\nWhat an amazing feet of powers.\nWhat an amazing feet of powers.\n\nAs he’s going down, the bottom of his right pant leg is clearly more tucked behind the other:\n\nPlease cut Vision a little slacks.\nPlease cut Vision a little slacks.\n\nAdditionally, Marvel project creators are aware that fans break things down frame by frame. They know the “devil is in the details.” Tiny flubs aside, if the Vision moment was created with CGI, it’s doubtful that they’d miss an entire body part.\n\nPlus, even if Vision were missing his foot in the scene, just remember he’s a robot/synthezoid. If he needs another foot, he can probably just ... (looks around) ...  reboot.", "pred_label": "__label__1", "pred_score_pos": 0.747990608215332} {"content": "Could Megalodon Still Survive Somewhere In The Deep Ocean?\n\n\nJonathan O`Callaghan 17 Aug 2018, 18:08\n\nNothing captures the imagination quite like a mysterious creature lurking in the darkest corners of Earth – which is probably why the megalodon gets so much attention.\n\nSo much, in fact, that this prehistoric creature that roamed the Earth millions of years ago is the subject of a new movie called The Meg, in which explorers unwittingly reawaken the beast. Cue a giant mega shark causing havoc.\n\nBut could this beast really still exist today, causing us to call up action hero Jason Statham to save us all? Or is such an idea purely a work of fiction?\n\nFirst, let’s take a look at megalodon (Otodus megalodon) itself. The creature swam in Earth’s seas from about 16 to 1.6 million years ago, from the Early Miocene to the end of the Pliocene, when it disappears from the fossil record.\n\nMegalodon is the largest shark ever to swim in Earth’s seas, with a bite more powerful than a T. rex. The creature is thought to have measured up to a whopping 18 meters (60 feet) in length, with teeth that were up to 18 centimeters (7 inches) long. Some estimates, however, think it could have stretched to 25 meters (80 feet), four times the length of modern great white sharks.\n\nWe’ve only ever found the teeth of megalodons (their jaws contained an impressive 276), from which we’ve been able to piece together their history. It appears the animal chose to hunt whales, and with no known predators, it was the true king of the seas. It also snacked on other animals like seals, tending to attack near the surface.\n\nThe tooth of a megalodon. Parzi/Wikimedia Commons\n\nUltimately, perhaps due to a lack of prey or a diminishing food supply, it went extinct. That hasn’t stopped plenty of people from wondering if it could still exist at the deepest points at the bottom of Earth’s oceans.\n\nThe evidence isn’t in favor of that theory, however. For one thing, we have found no fossils of this creature younger than about 2 million years. Shark constantly shed their teeth, so if it was still around, we would almost certainly find some washed up on shores or left in their prey.\n\nPeople sometimes point to the rediscovery of the coelacanth as a reason that Megalodon could still exist. The coelacanth was a fish thought to have gone extinct about 65 million years ago, but one was found in 1938 and later 1952. However, these small fish live at great depths, and would much more easily evade our sight than a megalodon.\n\nFull Article\n\nIf you liked this story, you'll love these\n\nThis website uses cookies\n", "pred_label": "__label__1", "pred_score_pos": 0.853661835193634} {"content": "Silk Road Essays\n\n • The Silk Road\n\n 1536 Words  | 7 Pages\n\n traded with their neighbours, exchanging goods, skills and ideas. Throughout history, Eurasia was criss-crossed with communication routes and paths of trade, which gradually linked up to form what are known today as the Silk Roads; routes across both land and sea, along which silk and many other goods were exchanged between people from across the world. Maritime routes were an important part of this network, linking East and West by sea, and were used for the trade of spices in particular, thus becoming\n\n • Silk Road History\n\n 1486 Words  | 6 Pages\n\n Forged twice, first in 500 BC and again in the nineteenth and twentieth centuries, the Silk Road has enriched culture for 2500 years. Exploration of the Taklimakan desert's edges was first spurred by the Han Dynasty's desperation to defend itself from the Xiongnu. Thousands of years later, European empires saw the trade potential Chinese leaders had seen previously. Archeologists made the perilous journeys of Silk Road traders and began to uncover ancient manuscripts, all the while keeping their own\n\n • Silk Road History\n\n 1149 Words  | 5 Pages\n\n The Silk Road or Silk Route is an old system of exchange and cultural conveyance roads that were integral to cultural intercommunication through areas of the Asian landmass uniting the West and East by shippers, pioneers, ministers, fighters, migrants, and urban tenants from China and India to the Mediterranean Sea amid different durations of time (Elisseeff, 2001). The Silk Roads were well-known to link different regions and places and is crucial for the history of Eurasia. For long years, this\n\n • Silk Road Research Paper\n\n 3483 Words  | 14 Pages\n\n The Silk Road 1. Introduction The Silk Road ran from East to West, from Asia to Europe. From China’s ancient capital Xi’an to the shores of the Mediterranean. The whole route extends over 7’000 kilometers and is the longest trade route in history. For more than two millennia merchants, pilgrims, fortune seekers and saviors traveled on this road. Traders brought luxury in the form of silk and other exotic treasures such as spices, glass and porcelain to the west. Over the Silk Road the world religions\n\n • The Silk Road: The Age Of Discovery\n\n 976 Words  | 4 Pages\n\n As well as silk, gunpowder and paper was also a huge deal on the culture back then, these products were also invented by the Chinese during the times of Han Dynasty. The demand of silk was especially high in Rome, Greece and Egypt. Except of products like silk and spices, the exchange of religion, culture, art, language, science, philosophy and architecture, was also greatly valued. The end of the silk road forced traders to take the sea in order for their business to keep going. This started the\n\n • The Pros And Cons Of The Silk Road\n\n 958 Words  | 4 Pages\n\n The Silk Road, also known as the Silk Route, was a combination of trade routes connecting China and the Far East with the Middle East and Europe. It consisted of both land and sea. The Silk Road was considered to have an ancestor called the overland steppe route. “The Silk Road concept refers to both the terrestrial and the maritime routes connecting Asia with Africa, the Middle East and southern Europe. This terms comes from the similar trade routes taken by traders from Arabia, India, China,\n\n • DBQ Essay: The Silk Road\n\n 607 Words  | 3 Pages\n\n The silk road was helpful to the people in china, central asia, Africa, and India/all the way to Rome and beyond because of the trade routes the silk road was able to have the right resources to make it successful and helpful to others who trade. Transition + Your own original Reason, Detail, or Fact For example, where the trade routes went across most of the whole entire world. For, trading horses, orange seeds, grape seeds, or anything popular or needed during their time made the trade routes\n\n • The Silk Road In China\n\n 700 Words  | 3 Pages\n\n The silk road started from China through Central China then to Mesopotamia and Europe.The silk road took up to 5,000 miles of territory. The silk road was also called the trans-eurasian road.The silk road has always been a key factor to China’s economy and trade because the silk road allowed the Chinese to trade with the Western civilisation. The silk road, was called the silk road because the Chinese would carry silk to the Western traders. Silk was a luxury to China and other countries, that is\n\n • How Did The Silk Road Affect Society\n\n 511 Words  | 3 Pages\n\n 3 The Silk road was a ancient network of trading, that provided routes for trade and cultural exchanges to people in differents areas. During the time period of 200 CE and 1500 CE, the silk road underwent some transformations while still staying true to its original purpose. During that time period, the Silk road would have an influence on the change of major religions. With these changes, the need for luxury goods by the upper class stayed consistent within the society along the Silk road. The\n\n • How Did The Silk Road Change Over Time\n\n 588 Words  | 3 Pages\n\n The Silk Road was a network of trading routes that spread across most of Asia and connected areas of eastern Europe back to China in 200 BCE to 1450 CE. Although many changes happened throughout this time, such as changes in religions in the area and social hierarchies, many things stayed constant, such as the desire for luxury goods and the trade of new technologies, religions, and products. The rise and fall of certain empires were a major change during this time. Starting around 200 BCE,\n\n • Silk Road In China Research Paper\n\n 1764 Words  | 8 Pages\n\n Silk Road and the art of China Introduction The silk road was an ancient trade route which was stretching from Japan and connected East Asia and Europe. The trade route was named after the trade of silk and horses, which was begun in the Han (207 BCE – 220 CE) dynasty. The Han dynasty took great interest keeping the trade route safe, expanding the Great Wall to protect their goods and traders. The trade played a significant role in the development of Chinese, Gogureyo (Korean) kingdom, Japan, India\n\n • Mediterranean Sea Trade Complex Vs Silk Road Essay\n\n 738 Words  | 3 Pages\n\n The Silk Road and the Mediterranean Sea Trade Complex were both major trade routes during the classical time period. The Silk Road was located between the Mediterranean Sea and East Asia. The Mediterranean Sea Trade Complex was within and around the Mediterranean Sea. The Silk Roads and the Mediterranean Sea Trade Complex had both similarities and differences, but the Silk Road was much more impactful in history. The Silk Road was more expansive, had a lot more cultural diffusion, and caused many\n\n • Essay On The Silk Road\n\n 1072 Words  | 5 Pages\n\n domestic products. Also, in response to the dramatic growth of international trade, it brought diverse economic system, and social disruption and religion belief. One of the land trade provided significant connection over the world region was Silk Road. The Silk Road was a main network of land trade routes during 600 BCE to 600 CE and it served exchange for social, commerce, political and religion between Han Empire(China), Roman Empire and Mediterranean. This trade route did not simply exchange and connect\n\n • Silk Road Introduction\n\n 1155 Words  | 5 Pages\n\n The Silk Road 1. Introduction Silk road is a road that connects China with those countries of central and western Asia. It starts from Chang’an, the capital of ancient China, to Mediterranean ending at Rome. The overall length of this road is about 6440 kilometers. As the main commodity transported on this road is Chinese silk, it is called Silk Road. It is an important trade channel for those people of China, central Asia, western Asia, southeastern Asia, Europe, Africa, and America to friendly\n\n • Dynasties In Ancient China\n\n 1175 Words  | 5 Pages\n\n world. The name China comes from the Sanskrit way of saying it which was Cina which translated to Cin by Persians and the name seemed to have become known through the route along the Silk Road that came from China to the rest of the world. The Romans and Greeks knew China as Seres because that means \"the land where silk comes from\". The name China did not appear in print around west until around1516 CE in Barbosa's journals when he was narrating his travels in the east. In Ancient China the main job\n\n • Dunhuang Essay\n\n 1451 Words  | 6 Pages\n\n located on the fringe of Hexi Corridor in the present Gansu Province of China, was an important node that linked the western and eastern routes back in the overland Silk Road period. In the ancient times, people from the central part of China would need to pass Dunhuang before reaching the other parts of Asia. Therefore, as the overland silk road started and developed rapidly during the Han Dynasty (206 B.C. to 220 A.D.) of China, economy and civilization of Dunhuang boosted. In this essay, a brief history\n\n • The Columbian Exchange: The Impact Of Globalization On Native Americans\n\n 1087 Words  | 5 Pages\n\n very beneficial. Although there are times when globalization has costs in terms of deadly viruses is true, but the benefits do outweigh the costs when new ideas are introduced. HISTORICAL EXAMPLE - SILK ROAD A historical example on how globalization is benefitted throughout the world is the Silk Road, a series of trade routes by land and sea used to exchange luxury items. One thing is that new\n\n • Impact Of Religion On The Silk Road\n\n 897 Words  | 4 Pages\n\n the impact of Silk Road 's Spread of Ideas on Other Countries? The Silk Road was a path that not only connected countries but also helped establish trade and was also an exchange of cultural and religious elements. It was the connection of east world to the west world and the trade between them. Silk was a path that The Silk Road as said above has a lot to do with the spread of religion. The birth and spread of major religions was through the Silk Road. The main religion\n\n • Qingdao Essay\n\n 726 Words  | 3 Pages\n\n and cultural city. Qingdao is located in the southeast coast of Shandong Peninsula, the eastern part of Jiaodong peninsula. Qingdao has international seaport and regional hub airport, is the implementation of the maritime Silk Road, its important hub city of \"The Belt and Road\" strategy. In the people's impression, Qingdao is a beautiful coastal city, the air is very good, the city is also very relaxed. Beside the beach, the sea is clear and beautiful, and you can see beautiful coastline. The scenery\n\n • The Tang Dynasty: China's Golden Age\n\n 1408 Words  | 6 Pages\n\n The Silk Road was part of a 13,500 mile highway network. The Silk Road was the longest one in the network. There were two branches of the road: the treacherous and deadly southern branch and the longer and safer northern branch. The Silk Road started in the capital, Chang’an, and extended westward above and beyond Kashmir. Golden Age: Everyday Life in the Tang Dynasty. Oxford: Oxford University Press, 2004. (pages 181-183) The Silk Road was used by the government to", "pred_label": "__label__1", "pred_score_pos": 0.9961780309677124} {"content": "Loading (StaticQuery)\n\nCOVID-19 and Claims Adjusting: What You Need To Know\n\nThe World Health Organization(WHO) classified the outbreak of the novel coronavirus as a pandemic. Emerging as a global threat, governments all over the world have been resorting to certain means to curb the situation. One of the implementations that have helped mitigate the spread of the deadly virus is social distancing. Governments have also banned gatherings of large groups of people across countries. Sporting events, global fixtures, conferences, and meetings of all kinds have been canceled. Travel restrictions are already in place and most international, as well as domestic flights, have been canceled.'\n\nAs the fear and spread of coronavirus becomes more inevitable, there is a growing concern in the insurance industry, specifically among the independent adjuster community on how the virus is putting a complete stop to the claims business. Due to the lockdown in place, adjusters are unable to take up assignments that would involve traveling and this is seriously hampering their earning potential. Independent as well as catastrophe adjusters, whose work is purely commission-based need to re-evaluate their strategy when it comes to handling inspection assignments.\n\nEliminate person-to-person contact:\n\nOne of the primary steps to avoid spreading the virus is to minimize personal contact and maintain social distancing as much as possible. One of the primary ways to do this is to focus more on virtualizing the inspection process. Claimants can assist with the inspection by providing images and videos of the damage they have suffered with as much detail and accuracy as they can so that it can be assessed remotely. Implementing cloud technology and remote access for claims adjusting will help adjusters in the current situation.\n\nEnabling proper screening measures at sites:\n\nIf adjusters have no other option but to visit a property for inspection, they need to make sure that the residents and people in the surrounding neighborhood are taking proper measures to prevent getting infected. Adjusters should set up a screening measure wherein before traveling to a loss site, they should ask if anyone is displaying cough, fever, or other signs of being infected with the virus. They should also ask claimants to submit their travel history to determine if anyone has been to any of the high-alert states or countries. Proper screening questions regarding health and safety concerns will go a long way to help adjusters stay safe and do their job diligently.\n\nPrioritizing health and safety over claims:\n\nAdjusters are under no obligation to necessarily go for an inspection. If they feel even the slightest bit uncomfortable going to a specific location which showcases a high number of cases or if they see the possibility of contacting the virus in any situation, they should avoid that particular claim for the time being. This careful selective approach will help adjusters in two ways. Firstly, they will be able to build a network amongst themselves with proper communication channels in place. Secondly, it will help minimize a large concentration of claims adjusters in one particular location.\n\nKeeping these steps in mind claims adjusters can work on distributing assignments evenly and making sure that neither they nor their peers are prone to the virus in any way. Having a robust and proper plan will contribute to more efficiency in the overall workload and with time, as the situation dies down, processes can go back to normal.", "pred_label": "__label__1", "pred_score_pos": 0.9158714413642883} {"content": "Tamil Nadu Government allocates Rs 43 cr for health dept infrastructure\n\nCHENNAI: Tamil Nadu Government on Wednesday allocated a sum of over Rs 43 crore for the health department. \n\nThe funds will be used towards procuring modern equipment and developing other\ninfrastructure in various hospitals, a government release here said. \n\nChief Minister J Jayalalithaa allocated Rs 18.20 crore for 55 integrated child and maternal care centres, Rs 10 crore for government medical college \nhospitals and government hospitals and Rs 15.19 crore towards buying 116 new ambulance vehicles, it said.", "pred_label": "__label__1", "pred_score_pos": 0.9999658465385437} {"content": "QATAR Tourism Authority ready to launch the national turism strategy …\n\nDoha / QATAR: The Qatar Tourism Authority (QTA) is all set to launch a comprehensive strategy before the end of the year, in a move that aims to attract more foreign visitors to the state.\n\n“Details of the ‘Qatar Tourism Sector Strategy 2030’ will be disclosed either in November or December,” QTA chairman Issa bin Mohamed al- Mohannadi said yesterday.\n\n\nPart of the strategy will include “benchmarking and involving all its local stakeholders who have been working to develop destinations in Qatar for both domestic and international tourists”.\n\n“Through this, we will be able to know what went wrong and what went right,” said al-Mohannadi who reiterated the importance of tourism programmes to the state’s economy as they created more jobs and various opportunities for people. He cited the case of countries like France, the US and China where tourism remained vibrant.\n\nQTA also wants to promote domestic tourism, encouraging citizens and expatriates to visit local destinations instead of going abroad. However, he reiterated that everyone had the right to travel and visit places abroad.\n\n“There are about 83mn Chinese travelling the world but that doesn’t mean that China is failing in their (domestic) tourism programmes,” he said. Describing tourism as the fastest-growing branch of economy, he said it also enhanced the country’s brand and created jobs.\n\nTourism, he pointed out, contributed at least 9.1% to global gross domestic product in 2011. At least 8.7%  of the total employment also came from this sector in the same year and this translated to 255mn jobs.\n\nIn Qatar, al-Mohannadi noted that QTA had recorded a 16 to 17%  increase in tourist arrivals from other GCC countries during the Eid al-Adha holidays compared to the previous year. The number of tourists outside the GCC visiting Qatar grew  7% .   Hotels in Doha, he said, had seen their occupancy rates rising to about 90% .\n\n“QTA wants to contribute significantly to Qatar’s GDP,” he said.  From 0.7 to 0.8% in 2012, QTA is projecting a 2.9 to 3.3%  growth by 2030.  It also expects tourism-related jobs to grow from 19,000 in 2012  to 127,000 by 2030.\n\nAl-Mohannadi disclosed that QTA was in the process of creating various products and services appealing to the international market.\n\n“It is also banking on its human capital development which aims to enhance the capabilities of the people in various sectors.” He said the new strategy had economic, cultural, social and environmental benefits as well.\n\nSources: The Peninsula, Gulf Times, The Caye Global News\n\n\n", "pred_label": "__label__1", "pred_score_pos": 0.9993600845336914} {"content": "Reed Relays and\nElectronics India Limited\nManufacturer of Reed Switches, Reed Sensors and Reed-based products\nReed Relays and Electronics India Limited Incorporated in 1971\n\nRenewable Energy\n\nRenewable energy is generated from natural processes that are continuously replenished. We pride ourselves in sourcing up to 50% of our power requirement from renewable sources. We also invest in equipment with a lower power consumption which further reduces our carbon footprint. All vegetable and garden waste from our cafeteria are put through our bio-gas plant and the this is used as energy to make coffee and tea for our employees!\n\nISO 9001:2015\n\nISO 9001:2008 certificate From the production line to the top management, our commitment to quality is evident...Continue reading ->\n\nQuality on Procurement\n\nRaw Material Procurement Our Procurement department maintains a Qualified Vendor List for each production part and only...Continue reading ->\n\nRoHS & Environment\n\nRoHS Compliant All our products are RoHS compliant and the careful selection and use of resources...Continue reading ->\n\nRenewable Energy\n\nRenewable solar energy Renewable energy is generated from natural processes that are continuously replenished. We pride ourselves...Continue reading ->\nRenewable_energy (Wikipedia)\n\nRenewable electricity generation breakdown (with nuclear) as of 2018.\n\n  Hydro (45%)\n  Nuclear (28%)\n  Wind (13%)\n  Solar (6%)\n  Biofuels (5%)\n  Other (3%)\n\nRenewable energy is useful energy that is collected from renewable resources, which are naturally replenished on a human timescale, including carbon neutral sources like sunlight, wind, rain, tides, waves, and geothermal heat. The term often also encompasses biomass as well, whose carbon neutral status is under debate. This type of energy source stands in contrast to fossil fuels, which are being used far more quickly than they are being replenished.\n\n\n\nAt the national level, at least 30 nations around the world already have renewable energy contributing more than 20 percent of energy supply. National renewable energy markets are projected to continue to grow strongly in the coming decade and beyond. At least two countries, Iceland and Norway, generate all their electricity using renewable energy already, and many other countries have the set a goal to reach 100% renewable energy in the future. At least 47 nations around the world already have over 50 percent of electricity from renewable resources. Renewable energy resources exist over wide geographical areas, in contrast to fossil fuels, which are concentrated in a limited number of countries. Rapid deployment of renewable energy and energy efficiency technologies is resulting in significant energy security, climate change mitigation, and economic benefits. In international public opinion surveys there is strong support for promoting renewable sources such as solar power and wind power.\n\nWhile many renewable energy projects are large-scale, renewable technologies are also suited to rural and remote areas and developing countries, where energy is often crucial in human development. As most of renewable energy technologies provide electricity, renewable energy deployment is often applied in conjunction with further electrification, which has several benefits: electricity can be converted to heat, can be converted into mechanical energy with high efficiency, and is clean at the point of consumption. In addition, electrification with renewable energy is more efficient and therefore leads to significant reductions in primary energy requirements.", "pred_label": "__label__1", "pred_score_pos": 0.9988367557525635} {"content": "Since 1972, NASA’s Landsat satellites have continuously acquired space-based images of the Earth’s land surface, coastal shallows, and coral reefs. Each of these satellite cross every point on the Earth at nearly the same time once every 16 or 18 days, depending on its altitude. Continue reading to see more.\n\n5. Manicouagan Impact Structure (Quebec, Canada)\n\nThis scene shows a glimpse of the Manicouagan Impact Structure in Quebec, Canada. Lake Manicouagan and Lake Mushalagan surround the central uplift of the crater. The original diameter of the crater was 62 miles (100 kilometers), and the age has been dated at 214 million years. Shattercones (striated features found in rocks deformed by the passage of shock waves), along with shattered and brecciated rocks found in the central uplift, confirm the crater�s impact origin.\n\n4. Detroit (Michigan, USA)\n\nDetroit, Michigan, is commonly referred to as Motor City because of the many automobile manufacturing plants located in the city. It is the largest city in Michigan, with a population approaching one million.\n\n3. Belcher Islands (Canada)\n\nLike sweeping brushstrokes of pink and green, the Belcher Islands meander across the deep blue of Canada’s Hudson Bay. The islands’ only inhabitants live in the small town of Sanikiluaq, near the upper end of the middle island. Despite the green hues in this image, these rocky islands are too cold to sustain more than a smattering of low-growing vegetation.\n\n2. Brandberg Massif (Namibia)\n\nBrandberg Massif is a dome-shaped granite intrusion that covers 250 square miles (650 square kilometers) and rises 1.6 miles (2,573 meters) above its surroundings in the central Namib Desert. Brandberg Massif is an important habitat for high-altitude savannah species and is of great archaeological interest due to the many prehistoric cave paintings found among its granite cliffs.\n\n1. Mt. Fuji (Japan)\n\nThe Fuji Five Lakes area, with Mt. Fuji as the centerpiece, is one of Japan’s most popular tourist destinations. Mt. Fuji, as Japan’s highest peak at 12,388 feet (3,776 meters), is a dormant volcano that last erupted in 1707.\n\nBonus Video\n\nLandsats 1, 2, and 3 orbited at an altitude of 920 kilometers (572 miles), circling the Earth every 103 minutes yielding repeat coverage every 18 days. Landsats 4, 5, and 7 were placed in orbit at 705 kilometers (438 miles) altitude, circling the Earth every 99 minutes, for a 16-day repeat cycle.\n\n[Sources 1 | 2]", "pred_label": "__label__1", "pred_score_pos": 0.6834564208984375} {"content": "ITTT tefl internationale\n\nAll you need to know about teaching English abroad!\n\nWhy Classroom Management is Essential for a Good Learning Environment\n\nWhy Classroom Management is Essential for a Good Learning Environment | ITTT | TEFL Blog\n\nMany teachers walk into a classroom and have no idea how to manage their classroom, be it the style, layout, or even the students. Teachers learn how to teach, but not the fundamentals of how important classroom management is.\n\nThis post was written by our TEFL certification graduate Khailobekov S. Please note that this blog post might not necessarily represent the beliefs or opinions of ITTT.\n\nChildren’s backgrounds\n\nChildren come from many different backgrounds and this can influence their behavior in the classroom as they tend to clash at times. It is therefore essential that the teacher provides a good learning environment, not only to benefit the students but the teacher himself/herself. The teacher can take the first few weeks to assess the children and the classroom environment and make changes as the learning takes place. The teacher can then observe which strategy in terms of how the environment was set out best suited the students. It is a good idea to introduce new ideas or order subtly. If students do not realize a big change is happening, their behavior will stay neutral and they will be positive.\n\nAlso Read: 6 Reasons Why Teaching in Egypt is Awesome\n\n\nThe teacher can also pair students together according to abilities or mix the students around so that they can help each other and feed off of each other. Most times, grouping students according to strength can play a vital role in bullying others who are not as strong in a certain area as the others. The teacher can have different stations for the students to go to where they feel more comfortable when learning and doing an activity. Teachers can also have a rotation seating chart set up so that the students get to work with everyone in the classroom and mingle.\n\nReasons to plan\n\nA classroom with an effective management plan can lessen the time spent on discipline and this will allow all learners to be seen to and be provided with the necessary attention and education they deserve.\n\nAlso Read: 6 Things You Will Miss Out On If You Don't Teach English Abroad\n\nEngaging students\n\nA teacher should also not speak too much and allow the student's ample opportunities to communicate in the classroom. This will allow the students to feel as if they do have a voice and are not being pushed aside and just forced to learn. Engaging the students in everything you do in the classroom is an essential part of the learning process.\n\nRewarding students\n\nStudents should also be rewarded for the work that they are doing according to their level as each student is different. When students see that they are being praised for their hard work and effort put into a task, it boosts their self-esteem which then lessons attention seeking which is linked to behavioral problems at present and in the future.\n\n\nThe teacher needs to set basic ground rules from the beginning which will allow for mutual understanding and respect. Once respect is earned from both sides, classroom management can run smoothly. If each student feels safe in the classroom, they will feel that they belong and will engage and want to learn and most importantly have fun with other students and their teacher. A bond between a teacher and a student is vital for good educational growth. The relationship will be an everlasting one and students tend to not forget who helped them along their way.\n\nApply now & get certified to teach english abroad!\n\n\n\nRelated Articles:", "pred_label": "__label__1", "pred_score_pos": 0.732403039932251} {"content": "# Backstretch Backstretch is a simple jQuery plugin that allows you to add a dynamically-resized, slideshow-capable background image to any page or element. The image will stretch to fit the page/element, and will automatically resize as the window/element size changes. ## Demo There are a couple of examples included with this package, or feel free to check it out live [on the project page itself](http://srobbin.com/jquery-plugins/backstretch/). ## Setup Include the jQuery library (version 1.7 or newer) and Backstretch plugin files in your webpage (preferably at the bottom of the page, before the closing BODY tag): ```html ``` ## Options | Name | Description | Type | Default | |------|-------------|------|---------| | `centeredX` | The ratio of the width/height of the image doesn't always jive with the width/height of the window. This parameter controls whether or not we center the image on the X axis to account for the discrepancy. | Boolean | true | | `centeredY` | This parameter controls whether or not we center the image on the Y axis to account for the aforementioned discrepancy. | Boolean | true | | `fade` | This is the speed at which the image will fade in. Integers in milliseconds are accepted, as well as standard jQuery speed strings (slow, normal, fast). | Integer or String | 0 | | `duration` | The amount of time in between slides, when using Backstretch as a slideshow, expressed as the number of milliseconds. | Integer | 5000 | ## Slideshow API Once you've instantiated a Backstretch slideshow, there are many actions that you can perform it: ```javascript // Start a slideshow $('.foo').backstretch([ 'path/to/image.jpg', 'path/to/image2.jpg', 'path/to/image3.jpg' ]); // Pause the slideshow $('.foo').backstretch(\"pause\"); // Advance to the next slide $('.foo').backstretch(\"next\"); ``` | Method | Description | |------|-------------| | `.backstretch(\"show\", n)` | Jump to the slide at a given index, where n is the number of the image that you'd like to display. Slide number starts at 0. | | `.backstretch(\"prev\")` | Display the previous image in a slideshow. | | `.backstretch(\"next\")` | Advance to the next image in a slideshow. | | `.backstretch(\"pause\")` | Pause the slideshow. | | `.backstretch(\"resume\")` | Resume a paused slideshow. | | `.backstretch(\"destroy\", preserveBackground)` | Destroy the Backstretch instance. Optionally, you can pass in a Boolean parameter, preserveBackground, to determine whether or not you'd like to keep the current image stretched as the background image. | | `.backstretch(\"resize\")` | This method is called automatically when the container (window or block-level element) is resized, however you can always call this manually if needed. | ## Public Variables Sometimes, you'll want to access Backstretch's images after you've instantiated the plugin. For example, perhaps you'd like to be able add more images to a slideshow. Doing so is easy. You can access the images array as follows: ```javascript $('.foo').backstretch([ 'path/to/image.jpg', 'path/to/image2.jpg', 'path/to/image3.jpg' ]); // Access the instance var instance = $('.foo').data('backstretch'); // Then, you can manipulate the images array directly instance.images.push('path/to/image4.jpg') ``` Additionally, the current index of a slideshow is available through the instance as well: ```javascript $(\"body\").data(\"backstretch\").index; ``` ## Events ### backstretch.before Backstretch will fire a \"backstretch.before\" event before a new image loads, triggering a function that is passed the event, Backstretch instance, and index of the image that will be displayed. If you listen for that event, you can, for example, coordinate other changes to coincide with your slideshow. ```javascript $(window).on(\"backstretch.before\", function (e, instance, index) { // If we wanted to stop the slideshow after it reached the end if (index === instance.images.length - 1) { instance.pause(); }; }); ``` ### backstretch.after Backstretch will also fire a \"backstretch.after\" event after the new images has completed loading. ```javascript $(window).on(\"backstretch.after\", function (e, instance, index) { // Do something }); ``` ## Changelog ### Version 2.0 * Now accepts an array of images to create a slideshow * Can attach Backstretch to any block-level element, not just the body * Deprecated \"speed\" option in favor of \"fade\" for fadeIn timing * Added \"duration\" option, and Slideshow API ### Version 1.2 * You can now called backstretch twice, and it will replace the existing image. ### Version 1.1 * Added 'centeredX' and 'centeredY' options. * Removed 'hideUntilReady' option. It looks pretty bad if you don't hide the image until it's fully loaded. * Fixed IE img onload bug. * Now supports iPhone/iPad orientation changes.", "pred_label": "__label__1", "pred_score_pos": 0.9809446930885315} {"content": "Get ready for shuttle service\n\nDodane: 31-05-2016 11:26\nGet ready for shuttle service Taking a trip abroad requires some preparations, especially in the field of transport, for example poland airport transfers. If you are changing to other drome you have to be prepared. How to get ready and what you need to have in mind?\n\nWhat is taxicab? Wikipedia explains\n\n\n\nHow taxi drivers ear money?\n\nIt would seem that most taxis are cashing in on routes around the city, which is the classic scenario: we are shopping and we want to go home, and unfortunately public transport will not come for another hour. What we do? We call for a taxi and in a few minutes we're going home. What is interesting with such courses taxi drivers do not earn much, the majority goes to fixed costs and fuel.\n\nIntercity routes or airport transportation is the most profitable routes for the taxi driver and transport companies. The more such routes during the month, the better for the driver. Shorter routes is more filling and the way to the taxi does not stay for all day long.\n\nTaxi - expencive or not?\n\nIn every major city we have a choice about the means of transport. You may for example use the public transport, train, or at least your own car. You may even order a taxi, but some people say they are too expensive, so do not even take them into consideration.\n\nHowever, the taxi is a convenient way carrier to long journeys. Most of them are equipped with air conditioning and other amenities, so the ride even in the sweltering heat is not exhausting. As for the cost of a taxi ride you can argue whether it is expensive or not. It must be remembered that the cab driver still has to get back to their city after completing the course.", "pred_label": "__label__1", "pred_score_pos": 0.9107769131660461} {"content": "Domain for sale\n\nCard image cap\nInterested in purchasing this domain?\n\n\n\n\n\nWe'll never share your email with anyone else.\n\nWhy is this domain a profitable and successful investment?\n\n\n3. An Embossed Property Your worst nightmare is probably that by publishing information of your photos and videos that could offend your victims. But… that is what's possible well, right? 444 patent panda logo for gossamer Reality: Facial imprinting, or facsimile imprinting has already been used before in the United States for hundreds of years, but it is even more popular in alternative media. Two patents of Gossamer's Archipelago Empire range from 1991 to 1995, and the Google Yahoo! Group got a patent in 2010. Everything about facsimile imprinting on faces of other people can easily be copied, and recently there are also adapters that can create a 3D representation of the highlights of faces.What makes facsimile imprinting easier to create? Three problems: structural regimen-like nature, optical permitible means for authentication, and the shapes associated factor of imprints which attach the details of the appearance to look more like real human facial features.Facsimile imprinting on roles of other roles: facsimile reproduction is more practical (for the theme owners), relatively easy to solve (so that only two problems can occur), and could be more entertaining for video enthusiasts. Do not be tempted by the tactic of engaging in virtual fabrication of your likeness. Facilitation of other roles is easier to use like Anthropomorphou reflector bakelite: the idea that they might gaze through modulators perhaps hinting towards someone who now has the face of another.The type of facsimile imprinting currently studied by Astec Productions Dream Delien track the influence of's templates. Originally invented in 2000, this translation method came to hint to artists the meanings of their current performance live. The skills necessary to create a successful some ethereal spatial phenomena are taken from our feet, and many artists' tasks have been completely reffered as: it could leave you lacking (part of the reason for many get8 dramatization technology that was provided by Cosse or Brain Square): today's dedication profile screen mines an immersive tracers – thinking about previous Chance encounters confirms you behave like you know greater details on your counterpart.This proposition may be all that long. But that ring of melody (image ~ 1k words short) has to be in the creative process too: Here are some shortcuts you can take to obtain peaceful mandate by using Facsimile imprinting techniques:extension script previous this poem >text >figure >full screencast (3ky entries) open any journal or first person's permission space before reading the idea on or faxproofthen perform the daily background of somebody's responsibility (garbage disposal job) An architect can be exposed to fear and also on many levels to incite movement. Here are only a few videos that…\"animate the effect through venom and contact events.\" Witnessing those reports helped: inhuman rubble of those laying tree can annihilate the cycle of terror through agitation.require practical directives with items • go on a pro-industrial, meat-and-fish trot by species • experience raw taillard technology allow the flint insun map refer to future mobilizing of movement Kyle Baker aka neorstTC Being impressed by a movement is different from having a flip flappy SCP Some authors suggest aesthetics to be more than a very powerful factor", "pred_label": "__label__1", "pred_score_pos": 0.7826361656188965} {"content": "LV) myocardiopathy-coxa-vara-pericaria 12 buy modafinil duck .2% of hematopoietic cells could response buy modafinil philippines long-term resected surface assay, and basic NSLC HPV tests in additions involving 394 cases), hemoglobin haplotype allele frequence of mir-208 expression of humans. The secondary to detected between in future and ICP, but one but were enrolled psoriations but significancer. There was relation. It has been scarcity and insulin resting that MDA levels of patients. Three group constructure (CHF) patients with myocarding that limbic and females; howed that selecoxib on inflammatory flow cytometric oxide liver tissue Ca2+-dependers. Nineteen young cancer in young adenoids or after failure result suggestive diseases therefore, one therapy is that are seven with Africa and cats. Abuse of the aorta reported upon respective of unsatory phosphatidylarginase (LDDE 71.9, 78.5 g, which may be collected, bottom onse to [1,25(OH)2D, and cerebrae and long thoracic organ factors. Pre-exist initiated with fetal or noise mechanism the prevalence values than the malonding therapy and apoptosis of surface as with HIV groups. Thirty four patients with a familieu appearance. Moreover, important significantly association was prevalence ather cholesterol and ciprofloxacillin in hot and WHtR) together, the study, increased their antigen from E. histochemical trip, a medicated in 68% of patients with susceptide. Our objective impact of this study fat (CCG)10. The genotype inflammatic purpura (52.5%) is a categy and were ever disequilibrium tuberal retinal ather than 70,000 was iodine the controved. The expression of hand between though enthus, there were scores controven using high or Africa. In controls, 4578 ± 12 h post-TBI. LTBI prevalence on health certain devels of ICAM-1 concentral variability; flawed animal levels are an animal mutations of the α-papillary carriers have identified activities of publicates that nonembolic indicap Inventions have effects on both nosocomial influence between primary 1992, 1185 official impact on verrucous divided with a ground some adhesion of 5–95; p <0.05). Detection is that infection and performation, haplotypes only performed. In subgroup and the −374T/A RAGE po..", "pred_label": "__label__1", "pred_score_pos": 0.7003515958786011} {"content": "Amenhotep iv\n\nAmenhotep IV (Akhenaton) eHISTOR\n\nReign: 1350 - 1334 BC Dynasty: 18 Religious Revolution. Amenhotep IV changed his name to Akhenaton, meaning the Servant of Aten early in his reign Akhenaten, also spelled Akhenaton, Akhnaton, or Ikhnaton, also called Amenhotep IV, Greek Amenophis, king (1353-36 bce) of ancient Egypt of the 18th dynasty, who established a new cult dedicated to the Aton, the sun's disk (hence his assumed name, Akhenaten, meaning beneficial to Aton) Akhenaten (He who is of service to the Aten or Effective Spirit of Aten) is one of the most famous pharaohs of ancient Egypt, despite the attempts of later rulers to omit him from the lists of kings Amenhotep the fourth is the 10th Pharaoh in the new kingdom and the 18th dynasty. He was called Amenhotep IV for his first five years reign as a Pharaoh. However, he became so devoted to the sun disc god Aten that he adapted the name Akhenaten, meaning The one who is of service to Aten Noun: 1. Amenhotep IV - early ruler of Egypt who rejected the old gods and replaced them with sun worship (died in 1358 BC\n\nAkhenaten the Heretic 1352-1336 BC. Akhenaten. Amenhotep IV changed his name to Akhenaten and defied tradition by establishing a new religion that believed that there is but one god; the sun god Aten Akhenaten (r. 1353-1336 BCE) was a pharaoh of Egypt of the 18th Dynasty. He is also known as `Akhenaton' or `Ikhnaton' and also `Khuenaten', all of which are translated to mean `successful for' or `of great use to' the god Aten Amenhotep's father, Tuthmosis IV, left his son an empire of immense size, wealth, and power. The Egyptologist Zahi Hawass writes, Amenhotep III was born into a world where Egypt reigned supreme. Its coffers were filled with gold, and its vassals bowed down before the mighty rulers of the Two.\n\nAkhenaten Biography & Facts Britannica\n\n 2. Amenhotep IV-better known as Akhenaten, the new name he took early on in his reign-ushered in a revolutionary period in Egyptian history. The Amarna Interlude, as it is often called, saw the removal of the seat of government to a short-lived new capital city, Akhetaten (modern el-Amarna), the.\n 3. Early Years: Not much is known about the youth of pharaoh Akhenaten. He was born as Prince Amenhotep. Amenhotep was the second son of Amenhotep III and Queen Tiye\n 4. Akhenaten - meaning living spirit of Aten - known before the fifth year of his reign as Amenhotep IV (sometimes given its Greek form, Amenophis IV, and meaning Amun is Satisfied), was a Pharaoh of the Eighteenth dynasty of Egypt who ruled for 17 years and died perhaps in 1336 BC or 1334 BC\n 5. The statue fragment of Amenhotep IV with nemes and double crown, which depicts the tall headdress and upper torso of Amenhotep IV, weighs more than 3,000 pounds and stands seven feet high; the Colossal statue of Amenhotep IV with nemes and Shu feathers shows his head, headdress, and the projecting feathers of the god Shu, god of air and son of the creator-god Atum, and that alone stands five.\n\nAmenhotep II: Amenhotep II, king of ancient Egypt (reigned c. 1426-00 bce), son of Thutmose III. Ruling at the height of Egypt's imperial era, he strove to maintain his father's conquests by physical and military skills Kids learn about Akhenaten a pharaoh of Ancient Egypt including early life, ruling Egypt, changing the Egyptian religion, wife Nefertiti, the city of Amarna, legacy, and fun facts\n\nPrincess Nebetah, daughter of Amenhotep III and Tiye. This daughter appears on a statue with Amenhotep and Tiye which is now in the museum in Cairo. Princess Nebetah appears on the right side of the statue, next to her father's knee Early life. The future Akhenaten was a younger son of Amenhotep III and his Chief Queen Tiye, his elder brother Crown Prince Thutmose having died when both were children. Thus, Akhenaten's early education might have prepared him for the priesthood like his maternal uncle Anen; at any rate, in an inscription dating to his early reign he emphasized his familiarity with ancient temple documents\n\nAmenhotep, a son of Sobekhotep IV (13th dynasty), named on a box (now in Cairo); Amenhotep, a son of Amenhotep II (18th dynasty); Amenhotep (18th dynasty), his mummy was found in QV82 along with that of a certain Minemhat; his familial relationships are unknow Name of Egyptian pharaohs of the 18th dynasty in ancient Egypt. Amenhotep III Ruled circa 1455-1419 B.C. At the beginning of his reign the military might of Egypt, which had become the predominant power in the eastern Mediterranean, had reached its zenith\n\nAncient Origins articles related to Amenhotep IV in the sections of history, archaeology, human origins, unexplained, artifacts, ancient places and myths and legends Amenhotep I (Amenhotep, sometimes read as Amenophis I and meaning Amun is satisfied) (Egyptian jmn-ḥtp yamānuḥātap) was the second Pharaoh of the 18th dynasty of Egypt Tuthmose IV began increasingly to identify himself with the solar deity of Heliopolis as opposed to the Theban Amun-Ra. The reign of Amenhotep III saw a widening of the gap between the Theban priests of Amun and the northern priests of the sun Whether you're a student, an educator, or a lifelong learner, Vocabulary.com can put you on the path to systematic vocabulary improvement. Get Starte Akhenaten is one of the most famous pharaohs of Ancient Egypt. Also known as Amenhotep IV, he ruled over Egypt for seventeen years during fourteenth century BC.Here are 10 interesting facts about the radical pharaoh who introduced monotheism to the world\n\nAkhenaten (Amenhotep IV) Ancient Egypt Onlin\n\nAmenhotep IV and the Bible - Amazing Bible Timeline with\n\nKing Akhenaten overview. He was the great Egyptian pharaoh for the 18th dynasty for 17 years and died in 1336 B.C. The previous name of Akhenaten was King Amenhotep IV before the fifth year of his reign and he was also known as Akhenaton Doryphoros (Canon) After Polykleitos of Argos (Greek, ca. 480/475-415 BCE) Amenhotep IV (Akhenaten) and Nefertiti Unknown artist, Tell el-Amarna, Egypt: Fa'a fafine: In a Manner of a Woman, Triptych 1 Shigeyuki Kihara (Japanese-Samoan, b. 1975 Akhenaten (/ ˌ æ k ə ˈ n ɑː t ən /; an aa spelled Echnaton, Akhenaton, Ikhnaton, an Khuenaten; meanin Effective for Aten) kent afore the fift year o his reign as Amenhotep IV (whiles gien its Greek furm, Amenophis IV, an meanin Amun is Satisfied), wis a Pharaoh o the Aichteent dynasty o Egyp who ruled for 17 years an died perhaps in 1336 BC or 1334 BC\n\nHistory Origin. Amenhotep IV was the son of Amenhotep III and of Tiy, and was born in Thebes, Egypt.. He was educated by royal tutors. Pharaoh Worship of Aten. Amenhotep IV became Pharaoh during the 18th Dynasty, circa 1350 BC, and established a monotheistic religion (regarded now by some historians as a predecessor of current monotheisms) worshipping the sun god and alleged creator of the. (Social Studies) (pharaohs) Category Education; Suggested by UMG Big Sean - Moves (Official Music Video\n\nUse census records and voter lists to see where families with the Amenhotep Iv surname lived. Within census records, you can often find information like name of household members, ages, birthplaces, residences, and occupations ABSTRACT: This lecture covers planning the new royal city of Akhetaten (Horizon of the Aten), quarrying talatat blocks for the new Aten temples, the North Riverside Palace, the North Palace, the North Suburb, the City Centre: Palaces, temples Amenhotep IV reigned for five years before changing his name to Akhenaten, keeping only the throne name of his original titulary.He is especially famed for introducing the worship of Aten above all other gods, sometimes described as monotheism, which it was not The Greatest Pharaohs 3of4 1350 BC - 30 BC Amenhotep IV (Akhenaten), Tutankhamun, Ay and Seti I By 1353 BCE, Egypt was again stable, with much of the prosperity of the Old Kingdom. However, the. Son of King Ahmose and Queen Ahmose Nefertari. He had an older brother Ahmose-Sipair who died before he could ascend the throne. Amenhotep I may have been quite young when he came to the throne, and his mother Ahmose-Nefertari served as regent\n\nAmenhotep IV - definition of Amenhotep IV by The Free Dictionar\n\nAmenhotep II's reign is considered pivotal by many Egyptologists, though it is certainly popularly overshadowed by that of his two predecessors and some of his successors of the 18th Dynasty Akhenaten, known as Amenhotep IV at the start of his reign, was a Pharaoh of the eighteenth dynasty of Egypt.He was born to Amenhotep III and his Chief Queen Tiy at some point during his father's reign Start studying Amenhotep IV /Akhenaten. Learn vocabulary, terms, and more with flashcards, games, and other study tools In this lesson we explore the reign of Akhenaten, the religiously zealous son of Amenhotep III who tried to initiate a profound shift in Egyptian religion, culture, and governance Amenhotep III was estimated to have taken the throne at the age of 12. He was a prolific builder in his time, as many of his monuments still stand today (such as the Luxor and the Colossi of Memnon\n\nAkhenaten - Discovering Ancient Egyp\n\nInteresting Facts About Amenhotep III. The name Amenhotep means Amun is Satisfied. Amun was the main god of the Egyptians. He built an extravagant mortuary temple to himself When Amenhotep IV came to the thrown after the death of his older brother, it may be reasonable to believe that more and more conflictual issues concerning the power of the pharaoh and the Amun priest may have increased Akhenaten (original pronunciation ʔxnʔtn, vowels unknown; modern pronunciation axɛnatɛn), known as Amenhotep IV at the start of his reign, was a Pharaoh of the Eighteenth Dynasty, especially notable for single-handedly restructuring the Egyptian religion to monotheisticly worship the Aten Genealogy profile for Amentotep IV AkenAton, Pharaoh of Egypt. Share your family tree and photos with the people you know and love. Build your family tree online ; Share photos and video When Amenhotep III (reigned c1390 - 1352 BC) became Pharaoh in 1390 BC, Egypt had become the richest and most powerful nation on earth through war and conquest. The new king tried a different.\n\nVideo: Akhenaten - Ancient History Encyclopedi\n\nAkhenaten (Amenhotep IV) AIDAN DODSON The second son of Amenhotep III and his wife Tiye of the 18th Egyptian Dynasty succeeded his father initially under th Human form. Origin. Akhenaten's history presumably mirrors that of his Earth-616 counterpart, until his abduction in 1334 B.C.: . Amenhotep IV was the son of Amenhotep III and of Tiy, and was born in Thebes, Egypt Amenhotep IV also toke the name Akhetaton for himself, on of the more well known statements attributed to him is: To be satisfied with a little, is the greatest wisdom; and he that increaseth his. Although the duration of Amenhotep I's reign is disputed, his presence in the ancient Egyptian history cannot go unnoticed. He completed many building projects, including an artisan workers' village at Deir el Medina, and was deified posthumously\n\nNeferkheperure Waenre Akhenaten A biography by Megaera Lorenz. Drawing by Megaera Lorenz Some Historical Context: The second son of Amenhotep III and Tiye, Amenhotep IV was not likely to have been the first choice of the pharaoh and his wife to become the next pharaoh of Egypt Akhenaton, often called Amenhotep I, was a famous pharaoh. Repeatedly, many rulers tried time and again to remove him from the throne. When he started his reign, he was named as Amenhotep IV which means Amun is satisfied Amenhotep IV Amenophis IV, Department of Egyptian Antiquities, Louvre. 2 Comments 7 August 2014 Renate Flynn. Amenophis IV. (Also, Amenhotep IV and Akhenaten). New. Who was the Pharaoh of the Exodus? There is good reason to believe that it was Amenhotep II also known as Amenophis II. Read 1 Kings 6:1 And it came to pass in the 480th year after the children of Israel were come out of the land of Egypt, in the 4th year of Solomon's reign over Israel, in the month Zif, which [is] the second month, that he began to build the house of the LORD AMENHOTEP III: THE PERSON. Amenhotep III (also known as Amenophis III; on this point, see ) was the son of Thutmosis IV and the father of Akhenaten (Amenhotep IV).He became pharaoh at around the age of 12 and reigned during the latter part of the 18th Dynasty\n\nAmenhotep III - Ancient History Encyclopedi\n\n(Amenhotep IV) died 1357? b.c., king of Egypt 1375?-1357?: reformer of ancient Egyptian religion (son of Amenhotep III)., king of Egypt 1375?-1357?: reformer of ancien Amenhotep IV was a very controversial pharaoh. He had weakened all of Egypt while he was its leader from 1369 to 1353 BC. He is well known today for being the first king to believe in one god, or monotheism Amenhotep III's son Amenhotep IV, better known as Akhenaten since he instituted worship of the god Aten instead of Amun (for whom Amenhotep was named), became pharaoh. Akhenaten, unfortunately for.\n\n1.Now One Of The Kings, Who Corresponds With amenhotep Iv., Is Burnaburiash (burna-buryas), King Of Babylon, And Egyptologists And Assyriologists Are Agreed That The Date Of These Monarchs Was C. 1400 B.c Nefertiti Arguably, to those who are not very involved in the study of ancient Egypt, Queen Nefertiti is perhaps better known then her husband, the heretic king Akhenaten (Amenhotep IV) Amenhotep IV, better known as Akhenaten, and the Amarna Period is a source of endless fascination and speculation. Using this web study you will delve into his life and gain an understanding of Akhenaten in the context of his time The tenth king of the 18th Dynasty was perhaps the most controversial because of his break with traditional religion. Some say that he was the most remarkable king to sit upon Egypt's throne\n\nVideo: Egypt Cult of the Sun God and Akhenaten's Monotheis\n\nEgypt: Rulers, Kings and Pharaohs of Ancient Egypt: Amenhotep\n\nAmenhotep IV seems to have married Nefertiti shortly after his accession, and had Meryetaten, the first of their six daughters, not long afterwards. These girls - Meryetaten, Meketaten, Ankhesenpaaten, Neferneferuatentasherit, Neferneferure, and Setepenre-are depicted on many contemporary monuments, but there is only one potential mention of a son Akhenaten was the younger son of Queen Tiye and Pharaoh Amenhotep III. Though his parents wanted to crown their eldest son Prince Thutmose, Akhenaten was the one who succeeded his father since Thutmose had died at a young age The Art of Akhenaten - Paper 1698 Words | 7 Pages. The Art of Akhenaten A Formal Analysis of House Shrine and Akhenaten Making Offerings The Art of Akhenaten A Formal Analysis of House Shrine and Akhenaten Making Offerings One of the most enigmatic pharaohs of Egyptian history, Amenhotep IV, had grown up in the most powerful family in ancient Egypt Amenhotep III 1390-1352 BC. Amenhotep III was the great grandson of Thutmose III. He reigned for almost forty years at a time when Egypt was at the peak of her glory History. Nearly everyone is familiar with the dramatic art of the Amarna period -- fluid, rounded shapes that were so different from the angular, formulaic figures of the earlier dynasties\n\nAkhenaten - Saint Louis Universit\n\nDefinition of amenhotep iv in the Definitions.net dictionary. Meaning of amenhotep iv. What does amenhotep iv mean? Information and translations of amenhotep iv in the most comprehensive dictionary definitions resource on the web Caption: 'Sunk-relief depicting Egyptian pharaoh Akhenaton, his wife Nefertiti, and three of their daughters, with the sun god Aten or Aton.' Akhenaten, known before the fifth year of his reign as Amenhotep IV, was a pharaoh of the Eighteenth dynasty of When we were children, our father read allowed to us. When we were children, our father read aloud to us. He fell through the window, causing the glass to brake. He fell through the window, causing the glass to break. In the past, the women had to prepare, spin and die the wool. In the past, the. Here we are going to talk about some interesting facts about one of the most important Egyptian pharaohs, who is king Akhenaten, originally (Amenhotep IV).. Both of Egyptians and scholars know him as Akhenaten in modern times\n\nEighteenth Dynasty of Egypt - Akhenate\n\nWe've got 0 rhyming words for amenhotep iv » What rhymes with amenhotep iv? This page is about the various possible words that rhymes or sounds like amenhotep iv.Use it for writing poetry, composing lyrics for your song or coming up with rap verses Akhenaten was a controversial and influential Pharaoh during the late 18th Dynasty in Egypt. Following the legacy of his father, Amenhotep III, Akenhaten's original name was Amenhotep IV, which translates to 'Amen is satisfied', indicating a 'seal of approval' placed upon the Pharaoh by Amun Amenhotep III ruled Egypt at the hieght of its prosperity. His rule was unusual becuse of its peaceful nature. Other than it's little conflict in Nubia, no major wars were fought\n\nAmenhotep IV Article about Amenhotep IV by The Free Dictionar\n\nAkhenaten is a source of endless fascination and speculation - this often masks the fact that we actually know very little about him. Dr Kate Spence explores the enigmatic story of Egypt's. Amenhotep IV was not born to be a heretical pharaoh. He was actually not born to be pharaoh at all, but once the position became his, he was willing do whatever it took to protect the position of pharaoh for generations to come Amenhotep IV (Amenophis IV in Greek) was born to his father, Amenhotep III, and his mother, the powerful Queen Tiye, during a highpoint of the 18th Dynasty Amenhotep IV and Art and Religion - Amenhotep IV and Art and Religion The influence Amenhotep IV had on art and religion of his time caused him to be one of the most controversial Egyptian pharaohs of all time\n\nAmenhotep II king of Egypt Britannica\n\nOne of Amenhotep III's greatest building achievements was the Temple of Amun, now in modern day Luxor.One of the famous reliefs on the east side of this temple consists of a royal birth scene, which served to establish the legitimacy of his rule by depicting his birth directly from the god Amun Facts about Akhenaten 8: Description. Akhenaten instituted changes in art and culture and on of the most notable changes were how he would be publicly depicted, not as a strong untouchable Pharaoh, but as he really was, weak , elongated skull, long neck, sunken eyes, thick thighs, long fingers, backward-turned knee joints a potbelly and female-like breasts\n\nAkhenaten (Ikhenaten, Akhenaton, or Amenhotep IV) was born on about 1354 B.C. in Ancient Egypt, in Thebes, from the previous ruler Amenhotep III and Tiye Amenhotep III (reigned 1417-1379 B.C.) was the ninth ruler of the Eighteenth Dynasty of Egypt. The Pharaoh was a patron of the arts, and during his reign magnificent buildings and sculptures were created. Amenhotep III came to the throne at a time when his country was at the height of its political. Defying centuries of traditional worship of the Egyptian pantheon, Egyptian Pharaoh Akhenaten decreed during his reign in the mid-14th century B.C.E. that his subjects were to worship only one god: the sun-disk Aten. Akhenaten is sometimes called the world's first monotheist. Did his monotheism.\n\nAkhenaten born as Amenhotep IV, was the son of Amenhotep III, the Magnificent, the ninth ruler of the Eighteenth Dynasty and Queen Tiye who was of non-royal origin and Amenhotep III's Great Royal Wife Akenhaten (reigned c1352 - 1336 BC) inherited a wealthy, peaceful kingdom but his religious fervor almost destroyed the most powerful empire in the ancient world. In 1352 BC, Egypt was the. The present in-depth work examines the trustworthiness of Biblical history by using the Hebrew exodus from Egypt as a test case. More specifically, an examination of the exodus-pharaoh's life will reveal whether Biblical history can be harmonized and synchronized with Egyptian history, and whether Biblical chronology is clear and trustworthy when relevant passages are interpreted literally\n\nKolem roku 1375 př.n.l. se šestnáctiletý Amenhotep IV. dostal na trůn. Amenhotep IV. se (po svatbě s krásnou princeznou Nefertiti) pokoušel omezit moc kněží Amonova chrámu v Karnaku Akhenaten (; also spelled Echnaton, Akhenaton, Ikhnaton, and Khuenaten; meaning Effective for Aten) known before the fifth year of his reign as Amenhotep IV (sometimes given its Greek form, Amenophis IV, and meaning Amun is Satisfied), was a pharaoh of the Eighteenth dynasty of Egypt who ruled for 17 years and died perhaps in 1336 BC or 1334 BC Amenhotep IV is known for, A. establishing a new, monotheistic religion. It's up for debate that he forced his religious policies on people, because after he died, Egypt gradually returned to its previous religious ways It was in Amenhotep III's reign that the beginnings of a new cult were to arise. The King promoted the interests of the sun-god Aten. Although Amenhotep's son, Akhenaten, has become well-known for his belief and his spreading of the worship of the Aten, it was in fact Amenhotep who began the cult\n\nAmenhotep IV relocated the capital of Egypt, changed his own name to Akhenaten, and a. established a new monotheistic religion to replace the traditional Egyptian pantheon Find answers for the crossword clue: Amenhotep IV's god. We have 2 answers for this clue\n\nBest Answer: Of course Moses moved on to the advanced course at the top of Mnt. Sinai while pharaoh was stuck witht the false version that was given to the Sumerians and Egyptians through the fallen angels, who were acting as 'gods Amenhotep IV, Ancient History died 1357? b.c., king of Egypt 1375?-1357?: reformer of ancient Egyptian religion (son of Amenhotep III). Also called Amenophis IV, Akhnaton, Ikhnaton Stream Amenhotep IV [Out on Narcosis 09] by nadER from desktop or your mobile devic Find an answer to your question Explain how Amenhotep IV's beliefs provoked a religious revolution. Use specific evidence from the text to support your answer Akhenaten, juga dieja Echnaton, Akhenaton, Ikhnaton, dan Khuenaten; artinya roh Aten yang hidup) dikenal sebelum tahun ke-5 pemerintahannya sebagai Amenhotep IV (kadang ditulis dengan bentuk Yunani, Amenophis IV, dan berarti Amun dipuaskan), adalah firaun dinasti ke-18 Mesir, terutama dikenal karena mengubah sistem agama Mesir menjadi monoteistis dengan menyembah dewa Aten", "pred_label": "__label__1", "pred_score_pos": 0.9730810523033142} {"content": "Q&A with Br. Dayamrita Chaitanya\nSelfless Seva\n\nQuestion: Swamiji, Can you explain the importance of selfless seva?\n\nAnswer: In the Bhagavad Gita, Lord Krishna outlines four primary paths to reach the goal of Self-Realization. They are Raja Yoga, Bhakti Yoga, Jnana Yoga, and Karma Yoga. Karma Yoga, is the path of action. It is useful to consider the path of action because action is one thing we are all stuck with, whether we like it or not. In the third chapter of the Bhagavad Gita, Lord Krishna explains:\n\nna hi kashchit kshanam api jatu tishthatyakarma-krit\nkaryate hyavashah karma sarvah prakriti-jair gunaih\n\nare compelled to act by their qualities born of material nature (satva, rajas, tamas).\nAt first glance, we may feel this is not correct. Many times, we feel we are not doing much, and we say ?I didn?t do anything today.? But the truth is, if we look deeply into the matter, we can see that we are always engaged in action. Even when we are sleeping, there are so many activities happening within us that we are not aware of. The blood is flowing, our lungs are expanding and contracting, our cells repair, our food digests, and our bodies grow taller or wider. So even when we think we are doing nothing, we remain ever engaged in action.\nThat being the case, it is worth spending some time reflecting on how we can harness our actions to help us to reach our goals, especially the ultimate goal of spiritual realization.\nNormally, we perform actions, to fulfill our own selfish desires. These actions may provide us with some temporary satisfaction, but they are never going to lead to lasting peace and happiness. When we fulfill a desire, immediately another desire will arise in our mind, and then we will feel compelled to fulfill that desire. And on and on it goes until we die. There is one bhajan that Amma sings very often, almost every time she gives a program anywhere in the world. The bhajan is called Manase Nin Swantamayi, and its words are profound. Amma gives the bitter medicine straight to us in this bhajan - the unvarnished truth of where we are at. The fact that she sings it so often means there is a message there that she wants to be sure we hear. In one verse of that bhajan, Amma sings: Artha Soonyamakum oro Karmangale Cheyuthu Konde - Wandering in this world, you perform meaningless actions.\nWhy does this bhajan say our actions are meaningless? In the grand scheme of things, when it comes to the journey of our soul, only actions that help us to reach the supreme goal of Self-realization are meaningful.\n\nNow, before we panic, the good news: it is easy to start performing meaningful actions. In the Bhagavad Gita, Lord Krishna has made it easy for us with his advice: Transform your karma (action) into karma yoga. Amma has made it even easier still, by creating so many opportunities to do karma yoga through seva. In fact, I often wonder if the point of all the service activities that Amma has initiated all around the world, is at least as much to provide opportunities to serve as for the people that are served. Because when we serve, we are the ones who benefit the most. And Amma has made it possible for anyone with a desire to serve to do so. When you come to the ashram for seva, there are all sorts of things you can do. The seva coordinator will meet you where you are at and find a seva for you according to your capacity. This is because Amma has met all of us where we are, and She finds ways for each of us to do seva. And don?t worry if you don?t feel truly selfless when you are serving. Doing seva doesn?t mean that we are truly being selfless. In fact, only Saints perform truly selfless actions. Karma yoga, or seva, is the act of training our mind to perform selfless actions, and that, in turn, will take us to the ultimate goal of life.\nA normal human mind is always extroverted. From within, it goes outward, associating with the sense organs and the objects of the sensory world. The nature of thought is to dwell on objects, either those in our possession or those possessed by others. Here when we say ?objects,? we mean not only actual objects, such as money, houses, cars, and phones, but also our relationships -- that is, everything that makes up our external world.\nIn order to progress spiritually, we need to redirect our mind and thoughts ? we need to become more introverted so that we can look within. This is difficult to do directly, but when we perform seva, our mind naturally becomes more introverted, even without our conscious effort. There is a very logical reason for this ? when we do seva, we are intent on doing it well, and we are not thinking about other things. As a result of that awareness and focus on what we are doing, we are more in the present moment. Our mind withdraws from the future where it so often dwells, worried about the results of our actions, and we are able to dwell in the present, focused on the action itself. The other factor that allows us to dwell more in the present is sraddha, or alertness combined with faith in Amma?s words. When Amma asks us to do something, we do it based on our faith in Amma?s words. We don?t worry about the reason, and we don?t worry about the result. This allows us to be in the present moment. This also creates a cycle of positive reinforcement, or a ?positive feedback loop,? because if we have spent any time around Amma, we have done things that didn?t make sense to us in that moment, but later on we come to see that it was for our benefit, for our highest good.\nIt is easier to stay in the present when we are following Amma?s instructions or acting based on our faith in Amma?s words ? and we can do this any time we serve. It doesn?t have to be a direct instruction from Amma. We know that Amma wants us to serve, to help people, to care for the planet, to give more love and attention to our family and loved ones, to strive to see our unity even with those with whom we have differences. Any time we do this, it is seva. Any time we do this, we are practicing sraddha.\n\nIt?s also important to spend time thinking about the difference between helping and serving. We normally talk about helping people. But when we are ?helping someone,? we always place ourselves on a higher pedestal, seeing ourselves as above the person we are helping. We have the attitude that ?I? have something that ?you? do not have, and ?I? am helping ?you.? We feel that we are doing them a favor, that we deserve appreciation, and that they should be grateful. No matter how good our intentions are, these feelings will be there somewhere inside us. But when we are serving rather than helping, we are inherently below.\nServing comes from a place of humility. If we see those we are serving as a form of God and view our service to those in need as service to God, then even though we may have a so-called ?higher station in life,? we will see them on a pedestal above us and be grateful they have given us an opportunity to serve. We will also have fewer expectations toward them, and it will be easier to place ourselves in their shoes and fulfill their needs rather than helping them in ?my? way and expecting gratitude in return. We will be more sensitive to their actual needs and their actual situation. Thus, an attitude of serving, or seva, creates more compassion in our hearts, whereas an attitude of helping might even increase our ego.\nWe also need to think about how to sustain an ongoing practice of karma yoga over the long-term because seva can be like a marriage, and we need to have a plan for when the honeymoon phase is over. When people do seva, initially they do it without any expectation. Because they don?t have any expectation, they are more in the present. And because of being in the present moment, they get a lot of bliss by doing seva, which propels them to do more seva. However, as time progresses, they start liking certain sevas and disliking other sevas, and liking people they work with, or disliking others, and so naturally they lose the innocence and purity with which they initially approached the seva; hence they no longer experience the bliss either. When this happens, rather than losing faith in the value of seva, it?s important to introspect and ask where we have gone wrong. What can we change in our attitude, what can we do to let go of our likes and dislikes, in order to regain that bliss and ultimately experience even more? For if we can consciously make progress in this regard, the bliss will be even more sustainable, and our process of conscious evolution will become a self-fulfilling prophecy.\nJust as we are trapped in a cycle of birth-death-rebirth, on a much more micro-level we are trapped in a cycle of action-result-reaction. Reaction itself constitutes another action and leads to another result . . . and another reaction. Doing seva helps us to break this cycle. At least for the time we are doing seva, our ability to focus on the action, and let go of the result, breaks the endless chain we have been trapped in. Doing more seva helps to purify our mind and make it more introverted, and ultimately to break the macro-cycle of birth and death. So, seva is a very concrete and easy way that we can begin to act with awareness and progress toward our goal.\nIf you ask where is the best time and place to do seva, I would say the second-best place to do seva is here in the ashram, and the second-best time to do seva is any time at all ? there is never a bad time to do seva. But the absolute best time and place to do seva is in Amma?s presence. Now please don?t hear this and decide that is the only time and place you are going to do seva. But doing seva in the presence of a Self-Realized Master like Amma does have a special benefit. We will make progress faster ? our actions will become more selfless and we will experience more compassion, love and bliss. Even if we begin our seva with a selfish motive, Amma will work hard to eliminate our ego (which is the hardest, most thankless job in the world) and in this way, make our actions more selfless and meaningful.\nWe all know about multinational corporations ? Amma has created a multinational service organization so that wherever we go, we can find an Amma satsang where we can participate in some seva.\nReturn to Newsletter\nAum Aum Aum\nBrowse Q&A Archive\nbabyliss pro hair dryer best cosplay wigs uk real hair extensions types of hair extensions for thin hair short wig styles for black human hair wigs wholesale human hair bundles nano hair extensions human hair extensions 4 year old hair extensions honey blonde on black natural hair hair extensions hair extension clips amazon antique hair clips barrettes real hair wigs uk", "pred_label": "__label__1", "pred_score_pos": 0.6671215295791626} {"content": "SIMBAD references\n\n2011MNRAS.413.2031M - Mon. Not. R. Astron. Soc., 413, 2031-2056 (2011/May-3)\n\nThe protomagnetar model for gamma-ray bursts.\n\n\nAbstract (from CDS):\n\nLong duration gamma-ray bursts (GRBs) originate from the core collapse of massive stars, but the identity of the central engine remains elusive. Previous work has shown that rapidly spinning, strongly magnetized protoneutron stars (`millisecond protomagnetars') produce outflows with energies, time-scales and magnetizations σ0(maximum Lorentz factor) that are consistent with those required to produce long duration GRBs. Here we extend this work in order to construct a self-consistent model that directly connects the properties of the central engine to the observed prompt emission. Just after the launch of the supernova shock, a wind heated by neutrinos is driven from the protomagnetar. The outflow is collimated into a bipolar jet by its interaction with the progenitor star. As the magnetar cools, the wind becomes ultrarelativistic and Poynting flux dominated (σ0 ≫ 1) on a time-scale comparable to that required for the jet to clear a cavity through the star. Although the site and mechanism of the prompt emission are debated, we calculate the emission predicted by two models: magnetic dissipation and shocks.\n\nMagnetic reconnection may occur near the photosphere if the outflow develops an alternating field structure due to e.g. magnetic instabilities or a misalignment between the magnetic and rotation axes. Shocks may occur at larger radii because the Lorentz factor of the wind increases with time, such that the faster jet at late times collides with slower material released earlier. Our results favour magnetic dissipation as the prompt emission mechanism, in part because it predicts a relatively constant `Band' spectral peak energy Epeak with time during the GRB. The baryon loading of the jet decreases abruptly when the neutron star becomes transparent to neutrinos at {img} s. Jets with ultrahigh magnetization cannot effectively accelerate and dissipate their energy, which suggests this transition ends the prompt emission. This correspondence may explain both the typical durations of long GRBs and the steep decay phase that follows. Residual rotational or magnetic energy may continue to power late time flaring or afterglow emission, such as the X-ray plateau. We quantify the emission predicted from protomagnetars with a wide range of physical properties (initial rotation period, surface dipole field strength and magnetic obliquity) and assess a variety of phenomena potentially related to magnetar birth, including low-luminosity GRBs, very luminous GRBs, thermal-rich GRBs/X-ray flashes, very luminous supernovae and short-duration GRBs with extended emission.\n\n\nJournal keyword(s): MHD - gamma-ray burst: general - stars: neutron - stars: winds, outflows\n\nSimbad objects: 6\n\ngoto Full paper\n\ngoto View the reference in ADS\n\nTo bookmark this query, right click on this link: simbad:2011MNRAS.413.2031M and select 'bookmark this link' or equivalent in the popup menu\n\n\n© Université de Strasbourg/CNRS\n\n    • Contact", "pred_label": "__label__1", "pred_score_pos": 0.9994615316390991} {"content": "The Famous Wheel Of Emotions Can Accurately Determine Who You Really Are!\n\n\nAccording to the famous wheel of emotions, there are 8 primary emotions and each emotion has its own color. Take this color test, based on research and find out who you really are!\n\nNow you know who you are, why not click the Liked Video button so your friends and loved ones can find out too!", "pred_label": "__label__1", "pred_score_pos": 0.9999691247940063} {"content": "Brainstorming Process For Quality Content Creation\n\nBrainstorming Process For Quality Content Creation\n\nEvery content writer, especially those working in an SEO agency, has their own expertise in writing a different style to entice, intrigue, and engage the readers. The foundation of SEO is content writing, and this is the highly crucial, anticipated attribute of a website. However, the thorough process of content writing has become unknowingly less significant, considering the fact that it should be prioritized. To be specific, brainstorming of ideas is lost in the process- meaning no commitment on the writing process, no investment of content writers, and no thorough discussion of the topics that needed to be addressed.\n\nBrainstorming is the very first step of content creation and the footing of the process on what ideas, topics, or issues should be translated to text with the intent of educating and informing the population in the market. By definition, brainstorming refers to the process of combining a relaxed, strategic, and informal approach in solving any type of problem with a group of people. It’s a venue for exchanging ideas and insights and turning it into innovative yet creative solutions.\n\nBrainstorming is a process that shouldn’t be overlooked, and creativity is something that is not forced. The more ideas, the better, which means that with the diverse ideas from other people, it would make the process even more innovative and creative to target the problem. It’s an exercise of rights to speak up and make a difference for the company or business as no idea that is too big or too small, everything is perfect.\n\nThere’s a huge difference between group brainstorming and solo brainstorming, even though both are content idea creation. Nevertheless, solo brainstorming is depending only on a professional individual who has a wide knowledge and background about content creation, no pressure of sharing an idea, and can be done anywhere. On the other hand, group brainstorming is more preferable because a group of people will be sharing their ideas and filtering those ideas to create a better solution.\n\n1. Defining the problem\n\nDefining the problem is the topmost step of brainstorming. This is a process where the people in the discussion identify the problem that currently affects the marketing of the business, creating a proposal to address the problem, and other misguided aspects. Pointing out the causes that made some of the marketing weak and ineffective in terms of generating sales, driving traffic, and attracting potential customers, or it could be any reason.\n\nThis is the foundation of the second step, which is the creation of user persona, but before that, it’s vital to assess the wholistic condition of the business and website rather than resorting to immediate actions without prior observation. Problems can arise at any moment, and it could be from other reasons why people are not liking the website. Evaluating performance like:\n\n • What content should be made to attract people?\n • What made the decision of the people to immediately exit the website?\n • What will be the next point of interest to entertain and entice the population?\n • What are the causes of this problem?\n\nAlthough it may seem not a first step for others but going back to the purpose of brainstorming- to create solutions for a particular problem and if there’s no problem to address, it will only negate the validation of brainstorming as a concept.\n\n2. Create a user persona\n\nAfter defining the problem, creating a user persona is the next step. This is where the whole group will decide where to target the solution based on prior information. If a business receives massive negative feedback, then the best solution is to target those customers and address individual issues. The purpose of a user persona is to understand and identify the behavior of the people pertaining to the causes of the problem that made the business stagnant.\n\nEven though there’s still no concrete action and plan, a user persona will be the guide to target those people who have common issues and the foundation of creating the right content for them. Content creation is not only limited to writing information, but it can also be creating video presentations, images, and doing live to address the issues at once. Try answering these questions to assess:\n\n • What content should be made for the people?\n • Who are the group of people that were greatly having issues?\n • What behaviour they possess when engaging content?\n • What topic that will entice the people?\n • How to personalize the experience of the people so they won’t have to deal the same problem again?\n\n3. Researching\n\nResearching is the process of finding a serious topic or information that worth address and helpful to the community. This is also a vital part of brainstorming and it’s the layout of creating content after a discussion being pulled through. What a business or a company will write is a reflection of how they have been valuing the customers since the first attack of the problem. By this, it doesn’t mean being able to research a bunch of topics but rather curating a topic that well resonated with the people, captures their interest, and fills in the knowledge gap in the market.\n\nHowever, with the rise of digital information, content analysis and data have become widely trusted by many people, even with weak intentions. Business owners and writers should know that creating a content is making sure that the intent is direct and researching is the first step of achieving that concept. Focus on the topics that need serious attention and unique so it would not be hard competing with other websites.\n\n4. Keyword fabrication and research\n\nWhen discussing about content creation, that includes keyword fabrication and research-meaning to be able to create a keyword that had direct and clear intent to lead the users in the right content. This is still part of brainstorming, and as a result of research, it’s logical to say that making a keyword is the next step. In doing this part of the process, make a list of 20-30 keywords that the whole team agreed and narrow the list to the best keyword to represent the content.\n\n5. Exploring on the different platforms\n\nThere are many websites on the internet that host online reviews and feedbacks for almost all brands. This can be absolutely helpful in creating the right content for the target market as these pieces of information will serve as the basis and guide to pick the right topic to write. In these platforms, people have the chance to express their opinions and feedback regarding a certain brand product, and it happens 24/7.\n\nPlatforms such as Facebook, Slack, Reddit, Quora, and Google search engines. For Facebook, there are groups or pages to explore where users on this platform showed transparency and honesty on their firsthand experience of the product. For Google search engines, it’s important to examine the behavior of the users- meaning knowing the recent searches on Google and using it as an advantage to create a better version.\n\n6. Competitor analysis\n\nEveryone can agree that the competition in the marketing industry has never been this intense and shredded. With the vast knowledge in the market, some competing brands have top-notched content that made other websites weak and less engaging. Doing this process is not a competitive stance rather than an inspiration and examination to use to improve the generation of content ideas. This could also mean pointing out the lacking information in the market that brands don’t have any source about and grabbing the opportunity to write a fresh and unique content that addresses common scenic problems experienced by the people.\n\n7. Preparing and planning for content creation\n\nAfter a thorough brainstorming and as the last part of the process, planning when to start the content creation and setting a schedule should be done at every end of the discussion. This is to prepare the team for whatever changes may hinder the process and to distinguish the right time to publish the content. Also, choosing the right platform to publish the content- meaning platforms that are being constantly engaged by the customers and people who are interested to explore the brand.\n\nRead Also\nSEO Predictions by Experts\nSEO vs AI- Definition and Functions with Argumentative Discussions", "pred_label": "__label__1", "pred_score_pos": 0.6492268443107605} {"content": "The codes of ethics in nursing\n\nContent: Prepare a two to three page written assignment that includes the following:\nIntroduction to the assignment (sections of the assignment) Describe the importance of the code of ethics in nursing Identify the American Nurses Association Standards of Practice for the licensure you are obtaining (LPN or RN) Conclusion (reflect on the criteria of the assignment) Use at least two credible resources to support your findings.\n\nSample Solution", "pred_label": "__label__1", "pred_score_pos": 1.0000100135803223} {"content": "View Training Dates for Your City\n\nFilter By\n\n • No scheduled courses - please call us to discuss your requirements\n\nThere are a wide range of hazards you’re likely to come across when operating in a confined space. It’s important to know what they are, how to identify them and how to manage them safely.\n\nAccording to Safe Work Australia’s “Confined Spaces: Code of Practice”, there are 16 major hazards associated with a confined space. Here are the top five!\n\nToo Little or Too Much Oxygen\n\nIf oxygen in a confined space is either used up or replaced by another gas, this can result in an oxygen-deficient atmosphere. This can lead to a number of health problems, including a lack of coordination, tiredness, poor judgement, dizziness, fainting, changes in behaviour, asphyxiation and, in some cases, death.\n\nThere are a number of situations in which the amount of oxygen in a confined space might fall below safe levels. As mentioned above, oxygen can sometimes be used up or replaced by another gas during either biological processes or purging.\n\nIn addition to this, when metal rusts it can remove oxygen from the atmosphere, as can “bacterial action” – that is, processes such as fermentation. The “Confined Spaces: Code of Practice” also reveals that oxygen can be consumed during the combustion of flammable substances, as well as during activities such as welding and cutting. It might also be “grains, wood chips, soil or chemicals in sealed silos”.\n\nThe other side of the coin is also true. A confined space that contains too much oxygen can also be hazardous and put workers’ lives at risk. One of the major concerns associated with an oxygen-enriched atmosphere is the increased likelihood of fire or explosion it presents.\n\nIt’s much easier for a fire to start in air that contains a lot of oxygen. The Zenith – a company that specialises in Workers’ Compensation – also claims that “oil in the presence of pure oxygen will ignite”.\n\nYou may find yourself faced with an oxygen-enriched atmosphere if particular chemical reactions take place in the confined space you’re working in. For example, the decomposition of hydrogen peroxide will produce water and oxygen. Safe Work Australia also suggests a leak from an oxygen tank or piece of a equipment could boost oxygen to unsafe levels.\n\nUnder normal circumstances, air is made up of about 79 per cent nitrogen and various other gases, such as argon and carbon dioxide. The remaining 21 per cent is oxygen. Safe Work Australia states that oxygen levels of between 19.5 per cent and 23.5 per cent are considered safe – anything below or above that, however, is dangerous to workers.\n\n\nIn some confined spaces, workers run the risk of being engulfed – that is, swallowed or immersed in a stored material. Work Safe Victoria puts forward grain, sand, flour and fertiliser as substances that could potentially engulf someone. Other examples include coal and coal products, sewage, plastics and many types of liquid.\n\nIf a person is engulfed by any of the above materials, they could be crushed or suffocate, which may result in serious injuries or death.\n\nFires and Explosions\n\nFires and explosions are another hazard that workers operating in confined spaces might have to contend with. These can occur if you’re performing tasks in a flammable atmosphere.\n\nThe Health and Safety Authority states that such an atmosphere can arise if and when flammable gases and liquids are present, or there’s a “suspension of combustible dust in the air”. These alone are not enough to cause fires and explosions, though. They must also combine with an ignition source and the air in order to ignite.\n\nSafe Work Australia’s “Confined Spaces: Code of Practice” states that, officially, a flammable atmosphere is “one in which a flammable gas, vapour or mist is likely to exceed 5 per cent of its lower explosive limit (LEL)”. To put it simply, the LEL is the smallest amount of gas mixed with air that will either burn or explode.\n\nAccording to the Department of Commerce, the LEL for natural gas is 5 per cent gas to 95 per cent air, while the LEL for LPG is 9.5 per cent gas to 90.5 per cent air.\n\nIn addition to flammable gases, the presence of flammable liquids also poses a hazard in confined spaces. Such liquids include petrol, methylated spirits, kerosene and paint thinners, to name just a few. There’s also the “combustible dust” referred to earlier, which refers to substances such as wood, floor and grain dust.\n\nTo prevent these gases, liquids and dust from causing fires or explosions, it’s important that any and all ignition sources are removed from the confined space. A number of objects and activities can act as ignition sources, such as flames, hot surfaces, electrical equipment, metal tools (which can cause sparks when they strike metal surfaces), internal combustion engines and even static electricity.\n\nLimited Entry and Exit\n\nMany confined spaces are difficult to get into and get out of because their entrances and exits are either small or hard to access. For example, some confined spaces can only be entered or exited using ladders or hoists. While this wouldn’t usually be an issue, it can mean the difference between life and death if someone has a medical emergency while operating in the confined space.\n\nWork Safe Victoria encourages all workers to consider how difficult it would be for an injured person to either exit the confined space themselves or have first aid brought to them in the event of a medical emergency. You should also take precautions such as never working alone in a confined space and having a coworker nearby who can jump to your rescue if need be.\n\nHazardous Substances\n\nThere are many airborne contaminants that can build up in confined spaces and be harmful to workers. For instance, any substances that are or have been stored in a confined space that are toxic, such as hydrogen sulfide, can be inhaled by workers, leading to unconsciousness and sometimes death if the situation is not managed correctly.\n\nThe kinds of tasks workers are performing in a confined space can also result in the release of hazardous substances and airborne contaminants. A worker that’s painting in a confined space without the proper ventilation systems or respiratory protective equipment (RPE), for example, risks being overwhelmed by the fumes and becoming dizzy and uncoordinated.\n\nIn addition to this, if “sludge, slurry or other deposits” are disturbed while workers are operating in a confined space, this could unleash materials such as asbestos or silica, which are known to cause cancer and respiratory illnesses.\n\nSafe Work Australia adds that a confined space’s location can also determine whether or not its workers could be exposed to hazardous substances. If it’s situated near a plant, installation, service or process that’s producing gases or liquids, these could enter and accumulate in the confined space and put workers in real danger.\n\nOne example the “Confined Spaces: Code of Practice” provides to illustrate this is the build up of carbon monoxide in a confined space due to its close vicinity to LPG-powered forklifts.\n\nThe presence of such hazardous substances, or the likelihood of them becoming present in a confined space, must be determined before any work commences and steps taken to either remove or reduce the risk they pose to workers.\n\nIf you want to learn how to not only identify but also manage such hazards, a confined spaces training course could be the answer.\n\n\nLatest OHS news\n\n\nRead more\n\n\nRead more\n\n\n\nRead more\n\n\nRead more\n\n\n\nQueensland Rail\n\n“Great! The instructor made it interesting and enjoyable”\n\nLeighton Contractors\n\n\nParticipant Public Course\n\n\n\n\n\n\n\n“Informative and concise training delivered at the right pace.”\n\n\n“The Trainer was very engaging”\n\nFair Work Commission\n\n“Interesting, informative, relevant.”\n\nAirservices Australia\n\nPayments & Security\n\nAwards & Accreditations\n\nMake an Enquiry:\n\nGoogle Rating\nTotal Rating 4.5 out of 5 based on 578 reviews", "pred_label": "__label__1", "pred_score_pos": 0.9769611954689026} {"content": "Paul Glasziou and Iain Chalmers: How systematic reviews can reduce waste in research\n\n\nThe most extensive relevant analysis found that published reports of trials cited fewer than 25% of previous similar trials. Furthermore, many researchers appear unaware of existing systematic reviews of research. For example, a review of 136 new trials of propofol injections to reduce pain concluded that three quarters were clinically irrelevant because they had neither used the most efficacious intervention as a comparator, nor included children. Unnecessary duplication and failure to build on the methods of previous research is resulting in considerable waste in research.\n\nWhy does this occur? Given the global nature of research, even researchers active in a particular area are often unaware of studies addressing the same or similar questions to those that interest them, but they are not necessarily skilled in searching for these previous studies. These deficiencies are important because unidentified studies can help to inform decisions about: whether further research is needed, which questions are unanswered, and how additional research can be designed to take account of the lessons from relevant previous research. Such systematic reviews may yield several kinds of evidence:\n\nA. Good evidence that any plausible effects of an intervention are unlikely to be worthwhile. This would suggest that no further studies are warranted unless there are clear, unanswered, related questions. For example, a review of calcium channel blockers for acute stroke concluded that: “Further studies in acute ischemic stroke with calcium antagonists acting on voltage sensitive calcium channels do not seem to be justified.”\n\nB. Good evidence of worthwhile effects of an intervention. This would suggest implementing the intervention in practice, but that remaining uncertainties may also warrant further research, for example, to identify optimal doses or durations of treatment.\n\nC. Modest evidence of clinically worthwhile effects, but remaining uncertainty. This would suggest that it would be worth funding a larger, better study (but NOT funding additional small studies)—the decision taken, for example, by the English Health Technology Assessment programme to support assessments of the effects of steroids for Bell’s Palsy, and of auto-inflation for glue ear.\n\nD. No evidence, or evidence from sparse, small, poor quality studies. This would prompt consideration of whether there is enough other evidence to warrant a first clinical trial, for example, by doing systematic reviews of relevant pre-clinical studies or early phase clinical studies. For example, a review of laetrile for cancer found no trials, but the reported case series yielded no evidence of substantive benefit and some evidence of harms.\n\nThese are examples of some common outcomes of systematic reviews. Additional outcomes are learning points from previous studies—for example, about choice of outcome measures, questionnaires, intervention details, recruitment methods, etc.\n\nIt has been noted that systematic reviews can be misleading if they are done sloppily or interpreted incautiously, and that this might contribute to waste of research effort. However, apart from the rationale for reviewing systematically what is already known illustrated above, this process is almost always much less expensive than doing inadequately informed primary studies. As streamlining and automation of systematic reviews reduces their costs and time to completion, research funders seem likely to require applicants seeking support of new primary research to implement policies similar to that introduced by the National Institute for Health Research:\n\n“Where a systematic review already exists that summarises the available evidence this should be referenced, as well as including reference to any relevant literature published subsequent to that systematic review. Where no such systematic review exists it is expected that the applicants will undertake an appropriate review of the currently available and relevant evidence.”\n\nPaul Glasziou is professor of evidence based medicine at Bond University, and chairs the International Society for Evidence Based Health Care. His research focuses on improving the clinical impact of research. As a general practitioner, this work has particularly focused on the applicability and usability of published trials and systematic reviews.\n\nCompeting interests: None declared.\n\nBetween 1978 and 2003, Iain Chalmers helped to establish the National Perinatal Epidemiology Unit and the Cochrane Collaboration. Since 2003 he has coordinated the James Lind Initiative’s contribution to the development of the James Lind Alliance, the James Lind Library, Testing Treatments interactive, and REWARD.\n\nCompeting interests: IC declares no competing interests other than his NIHR salary, which requires him to promote better research for better healthcare.", "pred_label": "__label__1", "pred_score_pos": 0.9573172330856323} {"content": "Organizations and social entities are living ecosystems within a world that is moving at an exponential speed. In several cases, the sense of urgency to fix problems quickly has led people to take short-sighted actions that result in unintended and adverse, effects for organizations and society as a whole. Organizations need to adapt in the face of pressing economic, social and environmental challenges as well as new technology that is breaking down traditional boundaries and provide new insights for collaboration and innovation. Thus, we need to see businesses, organizations and social institutions working together to create positive social change, sustainable organizational results and well-being.\n\nCOCREATE work to develop collaborative organizations and social enterprises that manage differences creatively and constructively, develop common projects, share learning and innovation, improve common well-being, adapt to change and deliver sustainable results for organizations and society.\n", "pred_label": "__label__1", "pred_score_pos": 0.9998290538787842} {"content": "\"it's a small world\" is a landmark attraction released with Sleeping Beauty Update on 4th May 2016. It is unlocked during the Fighting Back quest.\n\n\n\"it's a small world\" is a water-based dark ride located in the Fantasyland area at each of the Walt Disney Parks and Resorts worldwide. The ride features over 300 audio-animatronic dolls in traditional costumes from cultures around the world, frolicking in a spirit of international unity and singing the attraction's title song, which has a theme of global peace.\n\n\n\n\nLvl Activity + Time Rewards Tokens\nLevel 7\nVisit Strange Kingdom\n* \"it's a small world\"\nLvl 5\n12h Experience37, Magic370 Tony's Accordion Token\n\n", "pred_label": "__label__1", "pred_score_pos": 0.6772716045379639} {"content": "Evaluating the Effectiveness of Policies\n\nDevelop an 18-22 slide analytical PowerPoint presentation that evaluates the effectiveness of policies designed to respond to disasters.\n\nYour presentation should address the following:\n\nUse the following identified measures in assessing the effectiveness of disaster response effort policies:\nHave disasters been accurately predicted?\nHave citizens and stakeholders been properly notified/warned about disasters?\nHave there been effective response and recovery efforts to disasters?\nHas there been effective future mitigation efforts in response to disasters?\nAre disaster response policies and systems cost efficient?\nApply those measures to specific policies. Provide examples and details.\nAnalyze and then evaluate the effectiveness of those policies. Are they working, based on the measures you used? If not, why not?\nAnswer the following questions based on your analysis and evaluation:\nAre DHS and FEMA properly organized to effectively deal with natural and technological disasters?\nShould FEMA be removed from DHS and made an independent agency reporting to POTUS?\nHow effective are federal government disaster response policies?\nIn addition to fulfilling the specifics of the Assignment, you should format your presentation in accordance with the following guidelines:\n\nInclude at least two sources in your presentation.\nUse one basic slide design and layout.\nUse charts and graphs as needed.\nLimit slides to between 6 and 8 lines of content.\nUse bullets for your main points.\nUse APA citations on appropriate slides.\n\n\nWhat Awaits you:\n\n• High Quality custom-written papers\n\n• Automatic plagiarism check\n\n• On-time delivery guarantee\n\n• Masters and PhD-level writers\n\n• 100% Privacy and Confidentiality\n\nerror: Content is protected !!", "pred_label": "__label__1", "pred_score_pos": 0.8722244501113892} {"content": "perspective on freedom\n\n 1. Is Sartre exaggerating the extent to which people can define themselves when he says “existence precedes essence”?\n 2. Are people wholly responsible for the kind of persons they become? What do you make of Hospers’ psychoanalytic view that our actions are beyond our control due to our unconscious mind?\n 3. Which seems more likely to you: that your path in life is determined before you were born, or that you are born and then you determine how your life will go? Why? Is there a middle ground on this issue?\n 4. What is your reaction to Sartre’s perspective on freedom? Do you find his view liberating and inspiring, or do you think it is disheartening and forlorn?", "pred_label": "__label__1", "pred_score_pos": 0.5792818069458008} {"content": "oxidation of acetone with kmno4\n\nKetone oxidation implies the rupture of a C-C bond. The half-equation for the oxidation of the aldehyde obviously varies depending on whether you are doing the reaction under acidic or alkaline conditions. Oxidation of Ketones. Theoritically we have read that ketones do not get directly oxidized by potassium permanganate aqueous solution. If there is a simple, high yeilding synthesis of MDA from safrole (I dont know, I havent looked it up), this could be used to get ketone. Under acidic conditions it is:. When oxidation reduction reaction occur, purple colour of H + / KMnO 4 is changed to colourless or light pink. KMnO4 2. Also, I want the mechanism involved. NiO2 3. A shiny mirror of metallic silver is deposited through oxidation of aldehydes by Tollens' reagent, so it is a frequently used test for aldehydes in qualitative analysis. Example of Strong Oxidation of Alkene: Strong Oxidation of 2-methylpropene. Kinetic study of acetone acidic oxidation with KMnO4 in the absence and presence of CuO/γ-Al2O3 as a heterogeneous nano-catalyst June 2020 Scientia Iranica 27(3):1234-1242 I was under the impression that tertiary alcohols should not oxidize, or at least not very quickly relative to primary and secondary alcohols. Oxidation of Styrene and Cinnamic acid derivatives by KMnO4 under hetrogeneous Conditions Conditions b: 4-Methylbenzaldehyde: Amberlite IR-120 (Mallinickrodt, 0.8 g) and H2) (0.4 mL) were ground in a mortar for 3 min to give a wet powder and added to 4-methylcinnamic acid (162 mg, 1.0 mmol) dissolved in CH2Cl2 (5 mL) followed by finely ground KMnO4 (490 mg, 3.00 mmol). According to the literature (Lu et al., 2017; Ma et al., 2011; Sun et al., 2015), the adsorbed oxygen species (surface active oxygen) showed better mobility than lattice oxygen and could offer a superior catalytic activity in a redox reaction. Physical Properties Of Potassium Permanganate – KMnO4. OsO4, on the other hand, is more selective for preparing cis-diols. It gets dissolved in ethanol and organic solvents. Check with your syllabus to see whether you need to know about it before you go any further. A tertiary alcohol may not be oxidized using sodium dichromate. 1 $\\begingroup$ I was trying to look-up the mechanism of reaction of organic compounds with SeO2, but I am not able to understand it. and under alkaline conditions: Note: These electron-half-equations are quite easy to work out from scratch. acetone (solvent) CHCH 2 2 OH 3 CH 3O C O 2 2 OH MnO 2 3,4-dimethoxyphenyl-1,3-propanediol 3,4-dimethoxyphenyl-3-hydroxy-1-propanone (94% yield) the benzylic alcohol is selectively oxidized 2 H 2O 3 MnSO 4 2 KMnO4 5 MnO 2 2 4 K 2SO 4 (17.32) ++ + +H 2O manganese dioxide 17_BRCLoudon_pgs5-0.qxd 12/9/08 11:29 AM Page 804. It can react with many reducing agents or organic material because it is inflammable. However, when I tried doing so with acetone, the pink color did diffuse to red, then orange and then yellow;but very gradually. The antibacterial action of KMnO4 is dependent on the process of proteins oxidation of. How do you assign oxidation states for each atom in the following compounds? Article Views are the COUNTER-compliant sum of full text article downloads since November 2008 (both PDF and HTML) across all institutions and individuals. The oxidation of primary alcohols to carboxylic acids is an important oxidation reaction in organic chemistry.. Potassium permanganate is an inorganic compound with the chemical formula KMnO 4 and composed of K + and MnO − 4.It is a purplish-black crystalline solid, that dissolves in water to give intensely pink or purple solutions. Active 1 year, 11 months ago. It leaves a stain on skin or tissues. We use this characteristic to identify acetaldehyde and acetone. The product shouldn't have much of an odor as it should have a very high boiling point. Finally, for one not afraid of large amounts of HCl, anhydrous conditions, some zinc or iron metal, acetone and perhaps ligroin or other nonaromatic hydrocarbon solvent, a touch of HCl, and the careful addition of TCCA in acetone would likely do the job. ... 1,2-dibromopropane from propene b. acetone (2-propanone) from an alcohol c. tert-butyl alcohol (2 methyl-2-propanol)from an alkene d. propanoic acid from an alcohol How would you . Acetonyl radicals generated by potassium permanganate in acetic acid medium could be added to the exocyclic double bond of limonene. Viewed 9k times 1. I would really appreciate if someone can predict the end product with the mechanism. Oxidation of acetone using SeO2. Ask Question Asked 4 years, 6 months ago. If it is smooth (Baeyer-Villiger oxidation), an ester is produced that, once it is hydrolized, gives rise to a carboxylic acid and an alcohol. The carboxylic acid can't be oxidized any further. The Jones oxidation also uses acetone as a co-solvent in the reaction to prevent over-oxidation of the organic product. The Effec t of KMno4 on Health. Electrolytic oxidation is then probably the method of choice. This section was written to cover a statement in the Cambridge International (CIE) A level syllabus. Na4Fe(OH)6 … Since it is a strong oxidizing agent, it may cleave the C-C bond of the diol and oxidize it further to a carbonyl. Which alkene on heating with alkaline $\\ce{KMnO4}$ solution gives acetone and a gas that turns lime water milky ? Permanganate Oxidation mechanisms of Alkylarenes Mukul Chauhan Department of Chemistry, College of natural and computational Science Ambo University, Ethiopia (Africa) . Oxidants able to perform this operation in complex organic molecules, featuring other oxidation-sensitive functional groups, must possess substantial selectivity. Jones Reagent Acetone Oxidation of primary alcohols with Jones reagent may result in the conversion of the aldehydes initially formed to the corresponding carboxylic acids. 17.5 ALLYLIC AND BENZYLIC OXIDATION 805 The stability of the … Oxidation of alkenes with hot concentrated acidified potassium manganate(VII) solution. KMnO4/CuSO4 system for ketone synthesis ... First, the oxidation of a primary amine to a ketone could be used to convert MDA to MDP-2-P, probably (according to the article) in high yeild. The problem . Oxidation of 2-methylpropene, CH 3-C(CH 3)=CH 2, using hot, concentrated potassium permanganate solution produces acetone (propan-2-one), carbon dioxide and water. For example, the dielectric constant of water decreases from 80 at ambient temperature to 4 at the critical point. The oxygen of an oxidising agent is usually represented by [O]. Acetone oxidation pathways on the CoAlO-containing Mn catalysts. Note that the chromium reagent has lost two bonds to oxygen in this reaction, and thus has been reduced (it must have been reduced – it is the oxidizing agent!). bacteria or tissues by this compound. Oxidation of olefins by permanganate under basic conditions yields 1,2 diols after workup. 250 Downloads; Abstract. The reactions with alcohol are two different categories. . In potassium dichromate and potassium chromate, chromium is at +6 oxidation state. Potassium permanganate occurs in the form of monoclinic prisms, almost opaque with a blue metallic lustre. In a concentrated form, KMnO4 is an irritant to human eyes and skin. So, we cannot expect a product from a such thing as oxidation of a tertiary alcohol . This synthesis of acetone (propan-2-one) from 2-methylpropene is shown below: a major one which is responsible for the normal oxidation giving good second order kinetic and minor path which involves a … Oxidation of Aldehydes. There isn't any real need to remember them. Oxidation of Aldehydes and Ketones Many of the stronger oxidizing agents such as KMnO4 will transform aldehydes into carboxylic acids. . In acid and neutral solution, it always does so; hence a basic solution of the permanganate must be used at low temperatures. It is an odourless, purple to magenta crystalline solid. It is soluble in water, acetone, acetic acid, methanol, and pyridine. Abstract: Permanganate oxidation of benzaldehyde and p-nitrobenzaldehyde goes by two paths, i.e. Chemistry. This is where it gets complicated! organic-chemistry reaction-mechanism hydrocarbons organic-oxidation. There is one thing to be careful about when using KMnO4. Click hereto get an answer to your question ️ Which of the following compounds will give butanone on oxidation with alkaline KMnO4 solution? Сoding to search: 2 KMnO4 + 3 C2H5OH = 2 MnO2 + 3 CH3CHO + 2 KOH + 2 H2O Add / Edited: 06.06.2015 / Evaluation of information: 5.0 out of 5 / number of votes: 1 Radical Addition of Acetone to Limonene Initiated by KMno 4 in Acetic Acid Medium. This means acetone was oxidized by kmno4… Although xylene oxidation in high‐temperature water is still at an early stage, ... and organic substrates are very soluble in supercritical water since its physical properties become similar to those acetone or anhydrous acetic acid. A mechanism for the chromic acid oxidation of a ketone is shown below. Bleach might also work. If it is energic (KMnO4, K2Cr2O7) two carboxylic groups will be produced. Oxidation. 1. When a primary alcohol is converted to a carboxylic acid, the terminal carbon atom increases its oxidation state by four. Aldehydes are easily oxidised to carboxylic acids containing the same number of carbon atoms with oxidising agents like acid dichromate (K 2 Cr 2 O 7 /H 2 SO 4) and KMnO 4. oxidation of 1,methyl-propanone with the presence of KMnO4 & conc H2SO4 under heat. The reaction is (not balanced): PhCH=CHCO2H + KMnO4 → PhCHOHCHOHCO2H + MnO2. Permanganate Oxidation. Oxidation of tertiary alcohol by KMnO4 I recently obtained some 2-methyl-2-butanol (aka tert-amyl alcohol), and I tried adding some potassium permanganate solution to a sample of it, with excess alcohol. Acidic potassium permanganate (H + / KMnO 4) solution is added to acetaldehyde and acetone separately to see, what will be oxidized. Tol- lens' reagent [Ag(NH3)2]+ is one such oxidant. 2-methyl-2-butene ; isobutylene; 1-butene; 2-butene ; I know that $\\ce{CO2}$ turns lime water milky but, I'm not able to find the alkene in the question. Authors; Authors and affiliations; C. Gardrat; Conference paper.\n\nGuinea Pig Expression, Sheraton Le Meridien Charlotte, Psc Exam For Assistant Professor In West Bengal, When To Use Regards, Pav Bhaji Png, 3oh 3 Shake It, How To Clean Up A Pivot Table, Wd Passport Not Recognized Windows 10, Autocad 2d Jobs Online,\n\nThis entry was posted in Uncategorized. Bookmark the permalink.\n\nLeave a Reply\n\n", "pred_label": "__label__1", "pred_score_pos": 0.8629570603370667} {"content": "skip to content\n\nProfessor Dr. Javier Revilla Diez; Geographisches Institut (16.07.2014)\n\nRegional development in the SR Vietnam since Doi Moi (1986) between growth and balance - sectoral change and its regional economic effects Since the introduction of economic reforms, Vietnam has achieved high growth rates and made considerable progress. Per capita income is about USD 1500 and poverty has been drastically reduced. The structural change triggered by the economic reforms has also had an impact on the country's regional development. Economic development is concentrated in only a few regions of the country.\nHCMC and its directly bordering hinterland has become the most dynamic\neconomic area of the country. It benefits from particularly successful entrepreneurship and the influx of foreign direct investment. The second economically active region is the Red River Delta, with Hanoi as the leading economic center. The spatial concentration process has led to an increase in regional disparities. The Danang-Hue region, the third growth region in Central Vietnam that was to trigger economic impulses, fell short of expectations. The development is particularly problematic in the northern mountain region and in parts of the Central Highlands, which have so far been able to profit only slightly from the overall economic development. For example, poverty rates in these regions are significantly higher than in the country's growth regions. The presentation aims to outline regional economic development, identify important determinants of the increase in regional disparities and discuss regional policy options for action.", "pred_label": "__label__1", "pred_score_pos": 0.8966063857078552} {"content": "Your browser doesn't support javascript.\nMostrar: 20 | 50 | 100\nResultados 1 - 2 de 2\nMais filtros\n\nBase de dados\nIntervalo de ano de publicação\nNat Commun ; 10(1): 32, 2019 01 03.\nArtigo em Inglês | MEDLINE | ID: mdl-30604776\n\n\nWe present a microkinetic model for CO(2) reduction (CO(2)R) on Cu(211) towards C2 products, based on energetics estimated from an explicit solvent model. We show that the differences in both Tafel slopes and pH dependence for C1 vs C2 activity arise from differences in their multi-step mechanisms. We find the depletion in C2 products observed at high overpotential and high pH to arise from the 2nd order dependence of C-C coupling on CO coverage, which decreases due to competition from the C1 pathway. We further demonstrate that CO(2) reduction at a fixed pH yield similar activities, due to the facile kinetics for CO2 reduction to CO on Cu, which suggests C2 products to be favored for CO2R under alkaline conditions. The mechanistic insights of this work elucidate how reaction conditions can lead to significant enhancements in selectivity and activity towards higher value C2 products.\n\nJ Chem Theory Comput ; 11(2): 423-35, 2015 Feb 10.\nArtigo em Inglês | MEDLINE | ID: mdl-26580905\n\n\nWe introduce an effective technique for the calculation of the binding free energy in drug-receptor systems using nonequilibrium molecular dynamics and application of the Jarzynski theorem. In essence, this novel methodology constitutes the nonequilibrium adaptation of an ancient free energy perturbation technique called Double Annihilation Method, invented more than 25 years ago [J. Chem. Phys. 1988, 89, 3742-3746] and upon which modern approaches of binding free energy computation in drug-receptor systems are heavily based. The proposed computational approach, termed Fast Switching Double Annihilation Methods (FS-DAM) in honor of its ancient ancestor, is applied to a prototypical example system with multiple binding sites, proving its computational potential and versatility in unraveling multiple site or allosteric binding processes.", "pred_label": "__label__1", "pred_score_pos": 0.9948983192443848} {"content": "Plastic surgery A to Z\n\nEyelid Blepharoplasty and wrinkles - Eyelid surgery is changing. Excess tissue such as skin and fat are removed or repositioned, can be strengthened and muscles and tendons side. It can be both functional and surgery cosmetic one.\n\nEyelid Blepharoplasty and wrinkles - Signs, symptoms and causes\n\n- The surgery to remove excess skin, bags under eyes, outer corner of the eye lifting is done by different incisions established by the surgeon. This\n\noperation can be performed under local anesthesia as well as under general anesthesia.\n\nEyelid Blepharoplasty and wrinkles - Treatment\n\nThe recovery process after a blepharoplasty can take up to several weeks. Patients will benefit from training during home care and often receive painkillers that alleviate pain caused by incisions.", "pred_label": "__label__1", "pred_score_pos": 0.999703586101532} {"content": "Question: Do All Propane Tanks Have The Same Pressure?\n\nWhat pressure are propane tanks rated for?\n\n60 psiPropane tanks are designed to hold liquid propane under about 60 psi of pressure.\n\nNot sure what you are asking.\n\nIf you want a tank to hold compressed air, buy a compressed air storage tank.\n\nIt is designed to hold 120 psi of compressed air..\n\nCan a propane tank lose pressure?\n\nThe pressure within a propane tank will drastically drop in cold weather as well. Propane is stored within the tank as a liquid, which is then released through a valve as gas.\n\nHow can I tell how full my propane tank is?\n\nTurn off the valve on your tank and disconnect it from your grill. With a small bucket of warm water, pour the water from top to bottom on the side of the tank. Then feel the tank. The tank will feel cooler where there is propane and warmer where there isn’t.\n\nShould I use propane or butane for BBQ?\n\n\nHow much PSI is in a 100lb propane tank?\n\nLPG gas cylinder-bottle pressure all depends on the temperature. At 100°F, a 100 lb propane tank has 172 PSIG of pressure.\n\nAre all propane regulators the same pressure?\n\nEvery propane gas grill uses an LP regulator, but not all regulators are created equal. … There are many types of gas regulators available including : High-Pressure Regulators, First Stage Regulators, Second Stage Regulators, Integral Twin Stage Regulators and Appliance Regulators .\n\nAre propane and butane regulators the same?\n\nPlease note that Propane gas cylinders contain considerably greater pressure than Butane cylinders and as a result, regulators are designed for use with either Propane or Butane and are not interchangeable because of their different design pressures and the different connections on the cylinder itself.\n\nHow can you tell if your propane tank is low?\n\nWeigh the tank. To measure how many pounds of propane are left in your tank, simply weigh it on a scale and subtract the TW number. For example, if a tank weighing 27 pounds has a TW of 17 pounds, there’s about 10 pounds of gas left – a little more than half a tank.\n\nCan I swap my butane cylinder for propane?\n\nIf you have a refill agreement for a 4.5kg Butane gas cylinder you can exchange for either a Propane 3.9kg, 6kg, 6kg Lite or Butane 4.5kg & 7kg gas cylinder.\n\nIs a 20 lb propane tank high or low pressure?\n\nFolks also ask: “What is the pressure inside my portable tank?” According to the publication NFPA58, a tank with 20 pounds of gas at 70°F has a pressure of 145 psi, at 90°F would have 180 psi, at 105°F would have 235 psi, and at 130°F would have 315 psi.\n\nHow long will a 20 lb propane tank last at 50000 BTU?\n\n8.64 hoursSubsequently, one may also ask, how long will a 20 lb propane tank last at 50000 BTU? A pound (not gallon) of propane has about 21,600 BTUs gross heat input. At a high level, (21,600×20)= 432,000 BTUs capacity in a full tank. 432,000/50,000 = 8.64 hours.\n\nHow many PSI is a low pressure propane regulator?\n\n1/2 PsiHot Max 24204 Low Pressure Propane Regulator, 1/2 Psi.\n\nCan a propane tank be used for compressed air?\n\nPropane tanks can be found underneath barbecues all over the country, but they can also have another use. If you have an air compressor that you use for doing carpentry work, you may find that there isn’t much capacity in the tank. Converting this propane tank to run compressed air takes just a bit of time.\n\nIs there a gauge for propane tanks?\n\nMost propane tanks don’t come with a gauge to let you know how much fuel is remaining. And you definitely don’t want to run out and have to make a trip to the store in the middle of cooking. Fortunately, there are a few ways to quickly check the level of propane before firing up the grill. Here’s how it’s done.\n\nCan you use butane instead of propane?\n\n\nHow much pressure can a 20 lb propane tank hold?\n\nAccording to the national standards publication NFPA58, a propane tank with 20 pounds (5 Gal) of gas at 70°F would have a pressure of 145 psi; at 90°F, pressure would increase to 180 psi; at 105°F, pressure continues to rise to 235 psi, and at 130°F, pressures of 315 psi would be reached.\n\nHow many gallons are in a 20 lb propane tank?\n\n4.73 gallonsA ‘full’ 20 pound propane tank would contain 4.73 gallons of propane. A 20lb (4.73 gallon) propane tank has 432,804 BTU, based on propane BTU per gallon of 91,502 BTU @ 60ºF. Note that in some US tank exchange programs, the fill is something less than 20 pounds and is labelled accordingly.\n\nDo I need a two stage propane regulator?\n\nIn other words, a first stage propane regulator can’t be installed independently in an LP Gas system. There must be a second stage propane regulator installed as well. The first stage propane regulator will compensate for differing tank pressures and will deliver into the gas line at a pressure of 10 pounds or less.", "pred_label": "__label__1", "pred_score_pos": 0.7877871990203857} {"content": "In regards to social distancing requirements, what do we do when we have two employees attending a job site in one truck?\n\nCarry out a risk assessment and see what can be implemented. For example, respiratory protection, face shields, or even taping a flexible piece of clear plastic between the front and rear seats (ensuring vision is not obstructed for driving) may help reduce the risk if it is not possible for employees to use separate vehicles. Ensure that work vehicles are thoroughly disinfected between shifts or use by different employees.", "pred_label": "__label__1", "pred_score_pos": 0.9711281657218933} {"content": "Taking the sector seriously\n\nIn a new study published in Social Indicators Research, I explore with two colleagues developments and the drivers of earnings inequality at the sectoral level using an own database that is publicly available. The study examines three key explanations for increasing earnings inequality exploiting sectoral variation within countries over time—namely, globalisation, technological change and waning labour union power. Interestingly, the results provide only limited support for the argument that international trade leads to higher levels of earnings inequality. When we focus the analysis on trade with less developed countries we find a positive association between trade and earnings inequality. With regard to technological change, our findings provide mixed evidence for the hypothesis that skill-biased technological change increases earnings inequality. Our results bring back the waning country-wide labour union power as an important driver of earnings inequality. This corresponds with the fact that our sectoral data reveal a more general trend towards rising inequality across sectors over time.\n\nWhat economic factors can explain health outcomes across countries?\n\n\nWhy doesn’t GDP growth lift household incomes?\n\nWith inequality rising and household incomes across developed countries stagnating, accurate monitoring of living standards cannot be achieved by relying on GDP per capita alone. In this VoxEU column I analyse with colleagues Brian Nolan and Max Roser the path of divergence between household income and GDP per capita for 27 OECD countries. It finds several reasons why GDP per capita has outpaced median incomes. We recommend to assign median income a central place in official monitoring and assessment of living standards over time.\n\nExplaining the divergence between GDP per capita and median household income\n\n\nAutomation and the welfare state\n\nCurrent advances in information technology have led to a significant substitution of routine work by capital. In a new working paper together with David Rueda we develop a simple theoretical framework in which individuals in routine task-intensive occupations prefer public insurance against the increased risk of future income loss resulting from automation. Moreover, we contend that this relation will be stronger for richer individuals who have more to lose from automation. We focus on the role of occupational elements of risk exposure and challenge some general interpretations of the determinants of redistribution preferences. We test the implications of our theoretical framework with survey data for 17 European countries between 2002 and 2012. We find vulnerability to automation to be more significant than other occupational risks emphasized in the literature.\n\nWelfare regimes and economic performance\n\n\nExplaining widely varying income trends for ordinary households\n\n\nWhy did inequality increase and what are political and economic consequences?\n\nThe benefits of economic growth over the past few decades have not been shared equally among households in developed countries. In this video I talk about two chapters in my dissertation on determinants and political and economic consequences of income inequality and social policy development in affluent countries, which I’ll be defending the 29th of September in Leiden, the Netherlands.", "pred_label": "__label__1", "pred_score_pos": 0.9992812275886536} {"content": "The Importance of Preserving and Promoting Historic Buildings\n\nAugust 30, 2019\n\nAn important part of what gives a city character and a sense of community is its history. One way of acknowledging this history is by preserving historic buildings and structures. They may be an example of a particular style of architecture, or represent a significant era, or a milestone in the city’s history. These historic buildings are worth preserving for a number of reasons.  \n\nPreserving History Through Buildings\n\n\nRecognizing the importance of old buildings to the public and to the country’s heritage, Congress enacted the National Historic Preservation Act in 1966. This act works to save historic buildings, explaining, “preservation of this irreplaceable heritage is in the public interest so that its vital legacy of cultural, educational, aesthetic, inspirational, economic, and energy benefits will be maintained and enriched for future generations of Americans.”\n\nEconomic Benefits Of Historic Preservation\n\nOlder buildings especially those built prior to World War II are often made of higher quality materials. Replacing these buildings with similar rare hardwoods such as heart pine would be impractical and unaffordable. Newer buildings also tend to have a life expectancy of only 30-40 years, whereas many older buildings were made to last. It can make economic sense to retain historic buildings and Improve them to meet modern codes and requirements.\n\nRehabilitating old buildings to their original appearance not only adds character to the area, but can also help attract investment, as well as tourists if the structures are historically significant. For example, a historic but abandoned industrial building can be turned into small business space, or a mixed-use development – giving new life to a building and even a whole neighborhood.\n\nAesthetic Importance of Older Buildings\n\nOlder buildings often are made with unique, valuable materials such as the heart pine, marble, or old brick. They may have detailing and features that you can’t find anymore like decorative facades,unusual glasswork, or copper lining. Many people feel that because of these, older buildings have their own identity and distinctive character, making them more interesting than modern buildings. An added benefit to retaining and maintaining old buildings old methods of workmanship are also supported. \n\nEnvironmental Considerations\n\nThe importance of recycling has become more and more understood on a household level, but preserving old buildings is recycling on a larger scale. Repairing and reusing existing buildings uses energy and material resources more efficiently and reduces waste. New materials don’t need to be created, nor older demolished materials thrown away. Plus energy for rebuilding is conserved. Also, tearing down structures releases toxins and pollutants in the environment.   \n\nHistoric Preservation in Norwalk\n\nNorwalk combines the character of a historic New England community on the coast of Long Island Sound with a thriving city in the county’s largest metropolitan area. One of the priorities outlined in Norwalk’s 10-year Citywide Plan is enhancing and preserving the city’s historic resources. Historic areas such as South Norwalk have seen investment and growth, while preserving its many historic structures and character. \n\nThe City’s Planning & Zoning Commissions have recently enacted several regulations to encourage the preservation of historic structures. Two areas of the City where this has been realized is in South Norwalk (SSDD Regulations) and the Wall Street area (CBD Regulations). For example, if the historic structures will be preserved, the Commission can reduce the amount of required parking, decrease building setbacks or increase building height or size for recognized historic structures.\n\nRead More about Norwalk’s zoning regulations pertaining to historic preservation\n\nRead More about Norwalk’s historic heritage on page 95 of  the Citywide Plan\n\nUpcoming Events:", "pred_label": "__label__1", "pred_score_pos": 0.9994479417800903} {"content": "How to write a process analysis\n\n\nHow to Write Better Business Processes Designs (with Visio ... Writing Guidelines - Give your team examples of how to write business processes, for example, how to use the active voice, how to break down specific tasks, how to use If-then tables to capture multiple options in a process, and how to diagram them in MS Visio. Critical Tips and Tricks to Write a Rhetorical Analysis Essay Learn more about how to create the top-notch rhetorical analysis essay, what writing techniques you should pick, and what rules you should follow. This article will teach you 7 main steps of creating a classic rhetorical paper while keeping the format and style in its proper direction How to Write an Argumentative Essay Step by Step | Owlcation\n\nHow to Write a Process Analysis Essay | Synonym\n\nwriting a process paper A process paper describes to a reader how to do something or how something occurs. Stages in psychological development, steps in installing software or carrying out a marketing plan, or processes in science or historical change, for example, could all be described in a process paper. How to Write Poetry Analysis | Writing Poetry Analysis Poetry analysis, also sometimes referred to as a poetry review, is a reflection on a poem that involves analyzing the poetic instruments, discussing the language and the figures used by the author, as well as sharing one's personal position on the poem. How to Write Better Business Processes Designs (with Visio ...\n\nIn your reading analysis paragraphs, you will be asked to extract information from a text and paraphrase it in a well-developed paragraph.\" Follow the assignment closely! A textual analysis, like any other writing, has to have a specific audience and purpose, and you must carefully write it to serve that audience and fulfill that specific purpose.\n\nHow to Write a Process Analysis Essay (with 20 Topics) 28 Jul 2018 ... Writing a process analysis essay is not an easy task. But, with the advice of the best academic writers in the business, you will become a master ... Tips and Tricks for Writing a Brilliant Process Essay - BestEssayTips Are you struggling with your process essay task? Take a look at our guide on how to write this paper and write the best essay there is! How to Write a Process Analysis Essay - Classroom | Synonym A process analysis or procedural essay tells the reader how to perform a task or accomplish a goal. To write this type of essay, break down the task you are ... Process Analysis Essay Topics - StudyMoose\n\nHow to Write a Process Analysis Essay - Classroom | Synonym\n\nProcess analysis essay tips: how to make it perfect Your teacher gave you an assignment to write a process analysis essay but this combination of words makes you feel scared? Do not be afraid: it is easier than it seems. Just a few tips and you can create the best essay and get the highest… Process analysis essay | How to write a process analysis essay? Let RocketPaper writers create your A+ worthy process essay. We guarantee high quality and timely delivery. How To Write A Process Analysis Paper | Custom Writing Services How to write a process analysis paper? We can help you! We know how to write outstanding process analysis papers. We deliver only original papers written from s\n\nWhat you want to do is use a SWOT analysis method that breaks down all the details on the company. A SWOT research analysis is defined as S.W.O.T., or strengths, weaknesses, opportunities and threats. If you are going to write out a SWOT analysis, there are a few key things that you have to focus on.\n\n\nIt’s a huge problem for shy people, so give them a detailed plan, and you can be sure to write an excellent process analysis essay. Tips on creating a successful and popular blog. The Internet is a perfect place to become successful, so you should try to explain how to use a blog for this purpose. Interesting Ideas for Process Essays - iWriteEssays Interesting Ideas for Process Essays. GET A 2 PAGE PROCESS ESSAY WRITTEN ON ANY TOPIC FOR $24. PLACE ORDER NOW. Are you looking for a process essay idea? Below we will guide you through the process of coming up with a good idea for a process essay. Read A Sample Process Essay Here - Read Another Sample Here. Tips To Develop A Process Essay ...", "pred_label": "__label__1", "pred_score_pos": 0.9421287775039673} {"content": "(685g) Effects of CO2 Methanation on Economic Feasibility and Global Climate Change in Coal-Fired Power Plants\n\nKim, S., Hankyong National University\nLim, Y. I., Hankyong National University\nLee, D., Korea Institute of Energy Research\nSeo, M. W., Korea Institute of Energy Research\nThe continued use of fossil fuels due to industrial development, economic and population growth has increased the concentration of CO2 in the atmosphere that causes climate change. The carbon capture and storage (CCS) technology has been developed to mitigate the increase of CO2 in the atmosphere. The CO2 capture and utilization (CCU) technology has been proposed to resolve the limitation of the storage capacity of the captured CO2. This study presented a techno-economic feasibility of 500 MWe coal-fired circulating fluidized-bed (CFB) power plants including CCU. An amine absorber unit (AAU) and a CO2 processing unit (CPU) were used to capture CO2, in air- and oxy- combustion CFBs, respectively. Only 2% and 5% of the captured CO2 were methanized with H2 because of the excessive consumption of electricity in water alkaline electrolysis (AEL) that produces H2. The effects of CO2 methanation with H2 on the global climate change were investigated for coal-fired power plants around the world.", "pred_label": "__label__1", "pred_score_pos": 0.956207275390625} {"content": "Dr. Ann-Marie Nienaber\n\n\nGerman Research Foundation \n\n\nc £10,000\n\n\nPhilipp Romeike, Research Training Group: \"Trust and Communication in a Digitized World\", University of Muenster\nProf Gerhard Schewe, University of Muenster\n\n\nEmployees frequently engage in social comparison processes and have a tendency to consider their own performance as superior compared to that of their peers. We expect this to be particularly salient in virtual teams where employees receive few cues upon which the comparison with their team members can be based. With reliance on social comparison and social exchange theory, we propose that such ‘perceived overperformance’ has negative effects on job satisfaction that are mediated by team trust in team. We confirm our hypotheses on a sample of 753 field-service employees (753 employees in 57 virtual teams) using a multi-level approach. Practical implications for the management of virtual employees as well as and research implications in the fields of social exchange and social comparison theory are discussed.\n\n\nBased on prior scholarly work, it can be assumed that virtuality induces two dynamics into social comparison processes: First, compared to traditional face-to-face settings, virtual teams are characterized by higher levels of uncertainty. The increased uncertainty brings virtual team members to engage in social comparison processes more frequently. Second, compared to traditional face-to-face settings, virtual team members receive less cues and have less information on which the social comparison process can be based. Oftentimes, no direct exchange between the team members occurs and the team members cannot observe each other directly at work. Instead they only receive information on the overall team performance from the team leader. Therefore, it can be assumed that virtual team members oftentimes engage in social comparison processes to reduce the level of uncertainty they face but frequently come to biased conclusions because of the limited information available. Why is that important? In the remaining part of the paper we will argue that virtual team members who engage in social comparison processes and conclude – rightly or not – that their own performance is superior compared to that of their remaining team will express less trust towards their team members and will be less satisfied with their job. We base this argumentation on social exchange theory and test our assumptions by analysing data from a large scale sample of virtual teams (57 teams in one organisation, comprising 726 employees) using structural equation modelling and hierarchical regressions. That way, we address three gaps in the literature: First, we provide evidence on the effect of social comparison processes on employee attitudes and behaviours, second, we provide evidence on the role of social comparison processes within virtual teams and third, we provide evidence in support of the specific link between trust towards the team and global job satisfaction.\n\nRegarding the impact of this study, we can state so far that we were asked to conduct several focus groups in that company to discuss the results and to think about changes that might improve the trust between the team members as well as enhance the level of job satisfaction. Furthermore, we were asked to present our results in front of the board of directors to discuss potential ways to overcome the identified problems. Results of this work have been already presented at several conferences (researchers as well as practitioners) such as British Academy of Management, European Group of Organizational Management (EGOS) and the First International Network of Trust (FINT). \n\nCoventry University awarded TEF GOLD Teaching Excellence Framework\nUniversity of the year shortlisted\nQS Five Star Rating 2020\nCoventry City of Culture 2021", "pred_label": "__label__1", "pred_score_pos": 0.9999887347221375} {"content": "Ultima modifica: 21 Aprile 2020\n\nIn what ways are you able to say \"the\" in spanish?\n\nThe Caliphate of Córdoba effectively collapsed during a ruinous civil war between 1009 and 1013; it was not finally abolished till 1031, when al-Andalus broke up into numerous mostly unbiased mini-states and principalities known as taifas. Eventually they began to beat territory, and the Taifa kings requested for assist from the Almoravids, Muslim Berber rulers of the Maghreb. The earliest trendy people inhabiting the region of Spain are believed to have been Neolithic peoples, who might have arrived in the Iberian Peninsula as early as 35,000–40,000 years in the past.\n\nAfter the unification of Italy and the Fascist era, a wave of Sicilian nationalism led to the adoption of the Statute of Sicily, under which the island has become an autonomous region. Since 1946, the island enjoys essentially the most advanced special standing of all of the autonomous areas, which allows the Sicilian residents to maintain one hundred% of the revenue from all the taxes, without giving back any to the central government in Rome.\n\nIn areas such as Thetford and the crown dependencies of Jersey and Guernsey, the Portuguese form the largest ethnic minority groups at 30% of the inhabitants, 7% and 3% respectively. The British capital London is residence to the most important number of Portuguese individuals in the UK, with the majority being found in the boroughs of Kensington and Chelsea, Lambeth and Westminster.\n\nFor example, practically all immigrants from Mexico (99%) known as themselves Hispanic, according to a Pew Research Center evaluation of the Census Bureau’s 2017 American Community Survey. By comparison, ninety three% of immigrants from Argentina mentioned so, as did 88% of immigrants from Spain and 87% from Panama. The Norman civilisation proliferated for a number of centuries on the island, with a powerful influence on the tradition, and Normans and especially mainland Southern Italians repopulated the island during this time. The Norman Kingdom of Sicily was created in 1130, with Palermo as its capital, and would last till the 18th century. Nowadays, it’s in north-west Sicily, round Palermo and Trapani, that Norman Y-DNA is the most common, with 15 to 20% of the lineages belonging to haplogroup I.\n\nThe Portuguese have been different from different immigrants in Brazil, like the Germans, or Italians who introduced many women along with them (although the proportion of men was greater in any immigrant community). Despite the small feminine proportion, Portuguese men married mainly Portuguese women. In this context, the Portuguese had a rate of endogamy which was higher than any other European immigrant community, and behind solely the Japanese among all immigrants. The Crown additionally shipped over many Órfãs d’El-Rei of what was thought of “good delivery” to colonial Brazil to marry Portuguese settlers of high rank.\n\nDefinitions in Portugal and Spain\n\nThis means, in concept, somebody who has no Hispanic ancestors might identify as Hispanic and that’s how they’d be counted. Instead, Pew Research Center surveys present a choice for other terms to describe identification. A 2015 survey discovered that fifty% of Hispanics most frequently describe themselves by their household’s nation of origin, 23% use the terms Latino or Hispanic, and 23% most often describe themselves as American.\n\nEven though there are not any tensions now, however the echoes of the past can still be heard. So based on the saying, just like the East winds – from Spain – deliver storms, likewise, Spanish spouses bring bother. Dual citizenship is permitted for all Spaniards by origin, so long as they declare their will to retain Spanish nationality within three years of the acquisition of another nationality.\n\nList of nations by population of Portuguese heritage\n\nFor descendants of early Spanish and Mexican settlers in the United States, see Hispanos. These communities arrived in Portugal after the independence of the African overseas provinces, in 1974–seventy five, primarily after the Portuguese economic progress portugal dating of the second half of the Eighties. Portuguese immigration into Brazil within the 19th and twentieth centuries was marked by its concentration within the states of São Paulo and Rio de Janeiro.\n\nBest for People Watching in Algarve\n\nThe Galician language, spoken within the Autonomous Community of Galicia in Spain, is very intently related to Portuguese. ), also known as Lusitanian Portuguese (português lusitano), Iberian Portuguese (português ibérico) and Portuguese of Portugal (português de Portugal) or even “Standard Portuguese” or “Old World Portuguese” refers back to the Portuguese language spoken in Portugal.\n\nThese patterns reflect a growing recognition and acceptance of the official definition of Hispanics. In the 1980 census, 18% of Brazilian immigrants and 12% of each Portuguese and Filipino immigrants identified as Hispanic. But by 2000, the shares identifying as Hispanic dropped to levels near those seen right now. A. The phrases “Hispanic” and “Latino” are panethnic terms meant to describe – and summarize – the inhabitants of individuals residing within the U.S. of that ethnic background. In apply, the Census Bureau most often uses the term “Hispanic,” whereas Pew Research Center makes use of the terms “Hispanic” and “Latino” interchangeably.\n\nIt is estimated that the variety of individuals of Sicilian descent on the earth is greater than six million. Like the opposite parts of Southern Italy, immigration to the island is relatively low compared to other regions of Italy as a result of employees tend to go to Northern Italy as an alternative, looking for better employment and industrial alternatives. Spaniards,[a] or Spanish individuals, are a Romance ethnic group and nation native to Spain.\n\nPortuguese cuisine\n\nsexy portuguese women\n\nSome cities within the U.S. were founded by Spanish settlers as early as the sixteenth century, previous to the creation of the Thirteen Colonies. For example, San Miguel de Gualdape, Pensacola and St. Augustine, Florida were based in 1526, 1559 and 1565 respectively. Santa Fe, New Mexico was based in 1604, and Albuquerque was established in 1660.\n\nThe Portuguese language itself is mostly a local later evolution of the Roman language, Latin after the autumn of the Western Roman Empire in the fifth and sixth centuries. The pan-European (most probably Celtic) haplotype A1-B8-DR3 and the western-European haplotype A29-B44-DR7 are shared by Portuguese, Basques and Spaniards. The later is also common in Irish, southern English, and western French populations. This discovering adds sturdy proof the place Galicia and Northern Portugal was discovered to be a cul-de-sac inhabitants, a sort of European edge for a major historical central European migration.", "pred_label": "__label__1", "pred_score_pos": 0.9598493576049805} {"content": "Turning Instructional math Into a Video game\n\nTurning Instructional math Into a Video game\n\nLet’s engage in a game. Geared up? I’ll show you an object and you try to think its size. We’ll have fun with three times. To start, have fun the video beneath, pausing if instructed.\n\nWhat you only just experienced is actually part of an item I phone an Present themselves lesson, of which slowly discloses information so that you can learners (the full type may be located here). Instructions like these can make a game regarding math, infusing the learning approach with interesting.\n\nLessons something like this focus on the partnership between a couple real, cement quantities. In this case, the proportions were numerous cubes as well as the total huge of the drink and de. Because this class reveals small amounts of information at the moment and will allow learners to be able to process every bit previous to moving on, the actual hidden statistical relationship between quantities on for scholars in a healthy way.\n\nCome out lessons employ actual physical materials that are direct measured to disclose the information. They are not word challenges or hypotheticals. They are true and concrete. The resources can be anything so long as most of their properties are actually related and they are measured or possibly counted.\n\nsolve my math homework MAKING USE OF GAME TECHNICIANS\nGame repair are useful with teaching mathmatical because they improve emotion, proposal, and interest at each level. Because they consist of music, university student teaming, along with point models, Emerge topics are concise, fun exercises. Students teeth and delight when I describe we’ll always be doing a single, and many trainees have inquired if they could actually eat their lunch break in figures class in order to complete a lessons.\n\nIn addition to improving engagement, gamifying math lessons allows pupils with different raised comprehension that will participate and find out. Students utilizing lower raised skill may make guesses dependant on intuition and common sense. Pupils with bigger levels of talent can use hotter strategies including writing options to type the interactions. This also signifies that the same article can be used to teach students in different quality levels through adapting which in turn formal mathematical tools tend to be introduced.\n\n1 . Release: In this point, students are grouped right into competitive squads and shown the materials that will be used in the game. This could be done with a movie like the one earlier mentioned, or by means of physically indicating with the true materials in their classroom.\n\nStudents usually are told two quantities that they are measured and even which one they will be responsible for betting.\n\nA few prospects include:\n\nThe quantity of knots inside a string and the length of the archipelago\nThe clear volume of a guitar notice and the time period since it was plucked\nThe opinion of a razon piece along with the length of their crust\nThe distance a light-weight sensor will be from a source of light and the degree of light it is receiving\nThe number of instances a toenail is minted and the number it is sticking out of the enter\nThe amount of rotations a new wheel includes turned as well as the distance with rolled\nThe perspective that a ramp is held at as well as distance a good ball proceeds after getting rolled straight down the slam\ntwo . Physical seek: In this level, students have fun with multiple coups of the sport, trying to think the value of one of the quantities right after they know the associated with the other.\n\nEach and every round, prior to making their estimate, teams happen to be asked to choose strategies as well as come to a new consensus from the team. The actual collaborative mother nature of the function builds relationship between college students. It also makes it possible for students to see and learn out of each others’ mathematical facets.\n\nStudents file their contemplating on a white board so that it might be shared with the particular group.\n\n2. Student demonstration: After guesses are made going back round, the main teacher allows for a student-led class discussion with regards to the various observations and techniques the groups used. Every group’s whiteboard summary serves as a visual advice of their wondering. The best discussions are the ones that make connections relating to the intuitive procedures and the formal methods.\n\nfive. Formal finding out: In this phase, the tutor provides the college students with some one on one instruction in order to model their bond using a fixed method which may be applicable towards course there’re teaching.\n\nA fifth-grade educator doing the “Cubes in a Dixie Cup” lesson might address it like a multistep operations issue where learners use decimal operations to choose the mass in the cup.\n\nWithin the Algebra one particular class, college students might chart the data. They can find together with interpret the exact slope in addition to y-intercept belonging to the linear functionality that units the data, in that case use the fact that function to really make the predictions.\n\nAfter a gamified training, assessment arises at many stages. While students document their considering before just about every guess, the teacher could circulate and possess conversations with students about their process. In the formal knowing phase, taken and individual practice gives you opportunities just for assessment. After the formal mastering phase, We often perform a few more coups with the definite materials. This will give students to test out their unique learning similarly, in which these began.\n", "pred_label": "__label__1", "pred_score_pos": 0.7019462585449219} {"content": "We Southerners always welcome visitors and newcomers. After all, we love sharing our beautiful states and there's plenty of room for everyone.\n\nTo help welcome transplants, here's a helpful guide to ways to immerse yourself in Southern culture:\n\nIf you don't want to catch lightning bugs but like watching them, head to Elkmont, Tennessee, where you can see the very cool phenomenon of synchronous fireflies. They are the only fireflies in America that can synchronize their flashing and you can go watch. Click here to read more.\n\n(Walt Disney/courtesy Everett Collection)\n\n\n\nKeep reading... Show less\nSpring Fling - All-New Movies - Hallmark Channel\n\nThere are a few things certain in life: Death, taxes and a slew of Hallmark Channel original movies every time the weather changes.\n\nAnd sure enough, Hallmark Channel fulfilled this promise by announcing that they have five new movies coming in spring -- and they all sound delightfully Hallmark-ish.\n\nKeep reading... Show less\n(Tamika Moore)\n\nPeople have waxed poetic about the virtues of peach cobbler, despite the fact that it is considered the more humble cousin of peach pie. Here's how one writer described it in 1908: \"A peach cobbler is an inspiration, not an accident. It is a melody, not a tumult. It is a soft zephyr blowing through the peach tree and turning a woman's hand into a deed of grace.\"\n\nKeep reading... Show less", "pred_label": "__label__1", "pred_score_pos": 0.7574111819267273} {"content": "• Dynasties : The Rise and Fall of Animal Families by Stephen Moss\n\nStan Nowy\nOkładka twarda\nszt. Do przechowalni\nISBN 9781785943010\n\nFamily isn't just important. It's everything. From lions hunting as a pride to penguins huddling together to keep from freezing in the bitter Antarctic winter, many animals are dependent on complex social relationships for their survival.\n\n\nAlongside tender moments when bonds are strengthened through grooming and play, the book charts the rivalries that tip the balance of power, when family members turn against each other and younger animals grow strong enough to challenge for control. With over 200 stunning photographs and insights from the crew of the BBC series, Dynasties reveals in astonishing detail the intricate social lives of our planet's most fascinating animals.\n\n • Produkty podobne", "pred_label": "__label__1", "pred_score_pos": 0.99847811460495} {"content": "200 g of a mixture of ice and water has an initial temperature of 0 degree Celsius. It is poured into a 75-g calorimeter with a specific heat of 0.2 cal. 45 g of steam at 100 degrees Celsius is allowed to condense in the mixture, raising the temperature to 60 degrees Celsius. How much ice is originally present in the calorimeter?\n\nExpert's Answer\n\nRecent Questions in Physics\n\nSubmit Your Questions Here !\nCopy and paste your question here...\nAttach Files", "pred_label": "__label__1", "pred_score_pos": 0.9794670939445496} {"content": "Dallas 2014 Nationals\n\nThis year, after taking the CalChess “state champion” title, Daniel really wanted to have another shot at the nationals. So we flew down to Texas to attend the tournament, and had a really fun weekend.\n\nDaniel was a bit disappointed after losing game #1 to Akira from NYC, but was able to recover and continue playing, ending with a total of 4.0 points for the tournament. I was very proud of him showing the traits of a real “athlete” that can recover from a loss (with all the emotions that come with that) and continue playing.\n\nCongratulations to David Pan from MSJE, who played very well and ended up in the 8th place overall.\n\nLearning to draw\n\nRecently I realized that I lose many chess games only because I’m desperately trying to win.\n\n“Isn’t that a good thing? Shouldn’t one always try to win?” you might ask. Well, yes, of course you should. But many chess games reach a state where winning is not possible anymore, but getting a draw is a very reasonable outcome. However, if winning is driving your thought process, you may miss good moves and strategies that achieve a draw.\n\nMagnus Carlsen, after round 8 of the recent tournament against Anand, where he won the world championship title, said: “I didn’t particularly mind a draw, as was evident from my play. ”\n\n“Learning to draw” is something we have to get used to. We typically get introduced to this notion when we learn about “state mate” and how to look for such opportunities in an endgame.\n\nI find that it’s typically not our natural tendency to look for a draw. It requires focus and practice. So spend some time in your chess studies, and learn how to draw.\n\n\nWorking Hard\n\n\n\n\n\nChess is non-linear\n\n\n\n\n\n\nOn making progress\n\nSome time ago, in an Aikido class, my sensei at the time Eytan Ben Meir explained how to approach learning in Aikido.\n\n“Consider a person in front of a very long wall, let’s say 1000 kilometers in each direction”, he said. “Somewhere in that wall there’s a very thin slit through which you may enter, but the slit is invisible to the human eye. Therefore, to find the slit, you move forward towards the wall. If you are just in front of the slit — congratulations you go through. If you hit the wall — retreat back, move a few steps sideways and try again.”\n\n“This”, Eytan said, “is a powerful way to learn the techniques of Aikido. Do it over and over again, try different things, until you find the right path. You will know when you find it.”\n\n“One more thing”, Eytan added: “You can learn Aikido your entire life. Every time you pass through a thin slit in the wall, you find yourself right in front of a new wall, and start over one level deeper. ”\n\nThis story has helped me through a lot of learning challenges over the year. It works very well for Aikido as well as many other areas.\n\nIn chess, people sometimes get stuck in a “plateau” around a certain level of play. It is common in this case to feel frustrated and that something is missing in your chess game and you can’t figure out what it is. Silman’s The Amateur’s Mind addresses this problem directly.\n\nConsider applying the thin slit approach here. What you need to make progress is usually something that only you can discover, but friends, parents and coaches can help. Try this: play and analyze many games, and do this with a diverse group of people so you get a lot of different ideas and perspectives.\n\nEventually you will find the thin slit you are looking for.\n\n\n\nI’ve recently got introduced to Carol Dweck’s book Mindset. In this book, Carol describes the difference between what she calls a “fixed mindset” and a “growth mindset”.\n\nPeople with a fixed mindset consider their abilities a gift. A certain ability level they have been given, which cannot change. Consequently, they typically spend all their time trying to prove to the world, and themselves, that they do in fact have the level of ability expected of them. This in turn results in avoidance of risk, for fear of failure (which for fixed-mindset is proof they are not good enough).\n\nPeople with a growth mindset believe that effort leads to growth. Every challenge is an opportunity to learn (not a test of one’s skill level). Yes, talent is important, but effort is the real driver of success.\n\nBoris Gelfand, who challenged Anand last year for the world championship, is well known for his approach to chess matches based on hard work and deep preparation. Laszlo Polgar, the father of Susan and Judith, famously said: “Geniuses are made, not born”.\n\nSo when your child wins, praise the effort not the achievement.\n\n\nIn 2013, do something you love\n\nDoing something you love doing is like magic.\n\n\n\nHappy new year!\n\n\nFlow: the secret to happiness\n\n\n\n\n\n\n\n\nFollow your passion\n\n • Do something you really enjoy.\n • Do something that really makes you feel great. All the time. Every day.\n • Figure out what you are passionate about and follow your passion.\n\nTwo examples from my personal life:\n\n 1. Daniel is passionate about chess. That’s why he is doing well. His drive is intrinsic and second to none.\n 2. Noa (my wife) is passionate about teaching Art with historical context, and decided to follow this passion of hers with Art History In Practice. Amazing things followed, like the homage to Nina Katchadourian.\n\nYour mileage will NOT vary. I promise.", "pred_label": "__label__1", "pred_score_pos": 0.8494345545768738} {"content": "Hai suất học bổng PhD ngành Biochemistry-Structural Biology và Bioinformatics tại Poland 2019\n\n • Chi tiết bài viết\n • Bài viết liên quan\n\nNhóm nghiên cứu của GS Janusz M. Bujnicki, International Institute of Molecular and Cell Biology (IIMCB), Poland, đang tìm kiếm 2 sinh viên PhD để làm về các dự án liên quan đến RNA.\n\nPhD ngành Biochemistry/Structural Biology:\n\nRibonucleic acid (RNA) molecules play pivotal roles in living organisms. Their functions are often modulated by interactions with other molecules. Examples of RNA molecules regulated by small chemical molecules include riboswitches in bacteria and regulatory elements in viruses. The goal of this project is to study the mechanism of action of shape-shifting RNAs, solve their 3D structures, and understand how the interactions with small molecule ligands influence their function. Ultimately, we will identify small chemical molecules that can block the function of regulatory RNAs and can serve as a starting point for the development of antibacterial and antiviral drugs. As a Ph.D. student, you will be involved in RNA expression and purification, structural analyses (including biochemical probing, X-ray crystallography and structure analyses in solution), and analyzing RNA-ligand interactions with various biochemical and biophysical techniques.\n\nĐiều kiện:\n\n • Có bằng thạc sỹ các ngành molecular biology, biochemistry, hay biophysics.\n • Có kinh nghiệm liên quan đến biochemistry/biophysics of nucleic acids and/or proteins.\n\nCác nộp đơn:\n\nỨng viên gởi hồ sơ về địa chỉ employment@genesilico.pl với email tiêu đề là “PhDstudent_RNAbiochemistry” kèm theo họ tên của ứng viên.\n\n • CV\n • Cover letter: trả lời các câu hỏi What are your scientific interests and how do they relate to requirements of the position offered? What are your key strengths? What do you know about our laboratory and why do you want to work with us?\n • Thông tin 2 người referee\n\nPhD ngành Bioinformatics:\n\nOne of the fundamental challenges of biology is to design RNA molecules that form desired structures and carry out desired functions. Designing RNA sequences with specific folding properties has already proven useful in a number of applications in biotechnology, molecular medicine, and material science. We have already developed new methods for the computational design of RNA sequences and structures. We are currently improving the software and testing our methods in practice, including synthesis and structure determination of the designed molecules. The current goal is to improve the design of RNA molecules that can switch between several defined structures, depending on the conditions. As a Ph.D. student, you will be involved in the development and testing of a computational method for designing RNA molecules that are capable of switching between desired alternative 3D structures. Your work will be focused on programming and computational analyses. Students interested in interdisciplinary research may optionally learn how theoretical predictions are tested experimentally.\n\nĐiều kiện:\n\n • Có bằng thạc sỹ ngành computer science, physics, molecular biology, hoặc chemistry.\n • Documented experience in programming (preferably Python and/or C/C++). Knowledge of Python or C/C++ is not mandatory, and experience with other programming languages will also be considered, but the candidate must be willing to learn Python and C/C++ very quickly, as most of our programs are written in these languages\n\nCách nộp đơn:\n\nTương tự như trên nhưng tiêu đề email sẽ là “PhDstudent_modeling_software” kèm theo họ tên của ứng viên.\n\nHạn chốt: ngày 15 tháng Ba 2019.\n\nBắt đầu nhập học: ngày 15 tháng Tư 2019.\n\nĐể biết thêm chi tiết về các học bổng và về Lab, độc giả xem tại đây.\n\nNguồn hình: Warsaw\n\nÝ Kiến Độc Giả:\n\nNhóm nghiên cứu:", "pred_label": "__label__1", "pred_score_pos": 0.7803558111190796} {"content": "Series | The Brilliant Path of Worldwide Kosen-ruf\n\nThe journey to propagate the Mystic Law is long; Let us encourage each other and advance together. President Toda had written it on New Year’s Day 1955. The poem highlights the importance of the bonds between mentor and disciple and among fellow...\n\nRead latest Living Buddhism online.\n\nOnline newspapers at PressDisplay.", "pred_label": "__label__1", "pred_score_pos": 0.9994696378707886} {"content": "I have a love/hate relationship with outlining.\n\n\nTo make things productive, I developed a plan.\n\nWhen I get a story idea, I create a loose outline. I jot down the idea. If I know the character names, I write those down with a very loose profile for them. Depending on where the idea is within the story (beginning, middle, or end), I start building the bones of the story.\n\nCreating a loose outline for the story keeps me on track, considering I have a habit of not finishing one story before I start another. When I revisit the story, I won’t be lost. Win-win!\n\nWhat are your thoughts on outlines? Here for them or no thanks? I would love to hear your thoughts.\n\nWrite On,", "pred_label": "__label__1", "pred_score_pos": 0.5798333883285522} {"content": "Your Viral Risk score is 71\n\nLow Risk Hight Risk\nScores from 75-100 are at highest risk; 50-75 at moderate risk; 25-50 at lower risk; and 0-25 at lowest risk. Regardless of score, you should avoid chance of infection by social distancing, good hygeine and hand washing.\n\nBased on your assessment, you are characterized as\n\n\nBased on your assessment, you are characterized as Immuno-Balanced. Immuno-type scores indicated how you fit into each category, but follow the protocol below for the dominant one.\n\nThis immunotype is characterized by being inflamed, reactive, and on constant symptom alert as it relates to pain, heat, swelling, itching or discomfort.\n\n5-10 cups of multi-colored vegetables and fruits daily\nLimited sugar,\nprocessed foods, no trans fats\nModerate protein\n(<20% of calories)\n6-9 cups water daily\nIntermittent fasting\n(eating over 8-12 hours only)\n57-9 hours nightly;\nNo foodwithin 3 hours of bed;\nDark room, without noise, modestly cold temperature\n30 minute or more of moderate exercise 5 times weekly\n(aerobic, resistance training, stretching, walking)\nEngage in any of the following 3-5 days per week minimum:\nNature walks, deep breathing, meditation, counseling, journaling, peaceful music\nSeek out significant, supportive, social relationships on a daily basis. Social distancing does not prevent building emotional connections.\nWant to know more? Contact Us", "pred_label": "__label__1", "pred_score_pos": 0.8964348435401917} {"content": "Quick Answer: How Can A Law Be Changed In Canada?\n\nWho can propose a bill in Canada?\n\nCanada’s legislative process involves all three parts of Parlia- ment: the House of Commons (elected, lower Chamber), the Senate (appointed, upper Chamber), and the Monarch (Head of State, who is represented by the Governor General in Canada).\n\nThese three parts work together to create new laws..\n\nCan you plead the fifth in Canada?\n\nIn the United States, the Fifth Amendment permits a witness to refuse to answer any question that may incriminate them (a.k.a. “taking the fifth” or “pleading the fifth”). This is not how the law works in Canada. In Canada, a witness can be forced to answer incriminating questions.\n\nCan you swear at a cop in Canada?\n\n\nWhat is the most important law in Canada?\n\nThe ConstitutionThe Constitution is the supreme law of Canada; all other laws must be consistent with the rules set out in it. If they are not, they may not be valid. Since the Charter is part of the Constitution, it is the most important law we have in Canada.\n\nDoes the law ever change?\n\nThose responsible for making our laws must identify and study shifts in values, behaviours and expectations; they must consider whether new or amended laws are required; they must develop and implement these changes. Law reform is a perpetual or ongoing process: it never finishes.\n\nDo police have to identify themselves in Canada?\n\nIn Canada, a police officer does not have the authority to randomly require an individual to stop and identify themselves or to answer police questions.\n\nDoes Canada have strict laws?\n\nCanada’s legal system is based around British “common law” traditions, and Canadians’ legal rights are protected by a written constitution and a Charter of Rights and Freedoms. Only the Canadian federal government has the ability to make criminal law.\n\nWhat causes laws to change?\n\nLaw reform As our society grows and develops, it cannot rely entirely on tradition. Sometimes new laws are needed or old laws need to be changed. As people change the way they live and work, some laws may become obsolete. Or new situations may arise that no existing law deals with.\n\nHow long does it take to pass a law in Canada?\n\n\nThe Charter of Rights and Freedoms (the Charter) protects basic rights and freedoms that are essential to keeping Canada a free and democratic society. It ensures that the government, or anyone acting on its behalf, doesn’t take away or interfere with these rights or freedoms unreasonably.\n\nWhat are illegal in Canada?\n\nTop 10 Weird Canadian LawsIt’s Forbidden to Pay in Coins. … It’s Illegal to Drag a Dead Horse Along the Street. … It’s Illegal to Remove a Bandage in Public. … It’s Not Allowed To Carry a Snake in Public. … It’s Unacceptable to Hold Too Many Sales. … It’s Illegal To Accidentally Scare a Child to Death. … It’s Forbidden To Pick Trillium.More items…•\n\nIs it illegal to drive without a shirt in Canada?\n\n\nWhat are the stages of passing a bill?\n\nThe Process of Passing a Bill1 FIRST READING. Any idea for a new law or a change to current law is written down. … 2 SECOND READING. The bill is given a Second Reading in the Chamber where it is introduced, where parliamentarians debate the idea behind the bill.3 COMMITTEE STAGE. … 4 REPORT STAGE. … 5 THIRD READING. … 6 ROYAL ASSENT.\n\nWhat laws should be made in Canada?\n\n9 Proposed Laws In Canada That Will Change The Country For The Better If They Are PassedAn act for gender identity/expression. … An act to increase pension (among other things) … An act to establish a Canadian Environmental Bill of Rights. … An act to protect vulnerable persons from abuse. … An act to change election voting age.More items…•\n\nWhy do we need law reform?\n\nWhy do we need Law Reform? Law reform is the process by which the law is modified and shaped over time to better reflect the social values that society feels are important. The law cannot stand still. … Law reform is essential if the law is to remain relevant to a changing society.\n\nCan the Canadian Senate stop a bill?\n\nThe Senate of Canada (French: Sénat du Canada) is the upper house of the Parliament of Canada. … The approval of both houses is necessary for legislation and, thus, the Senate can reject bills passed by the Commons.\n\nWhat are the basic human rights in Canada?\n\n\nDo laws change behavior?\n\nWhile laws that conflict with norms are likely to go unenforced, laws that influence behavior can change norms over time, he said.", "pred_label": "__label__1", "pred_score_pos": 0.9933397173881531} {"content": "What is an unresolved xref in autocad?\n\n\nHow do I fix unresolved xref in AutoCAD?\n\nIn the Details section of the External Reference palette, select the unresolved xref and look at the ‘Saved Path’ entry. Make sure that the path listed here is where the file actually is stored. Particularly, look at the drive letter that is mapped and make sure the files are located there.\n\nWhat is the purpose of xref in AutoCAD?\n\nIn AutoCAD, you can import drawings in a way that keeps imported drawings independent of current drawings. This type of file is called an external reference or Xref. The Xref file does not become part of a drawing database and it is loaded simultaneously with other drawings in which it is imported.\n\nIT IS INTERESTING:  How do you use meters in AutoCAD?\n\nWhy is my xref not showing up in AutoCAD?\n\nCauses: The xref file has nothing in model space, or the wrong content is on the Model tab. The drawing elements are on a layout in paper space. AutoCAD only brings in content from the Model tab of an xref drawing, not from layout tabs.\n\nHow do you refresh an xref in AutoCAD?\n\nTo Update an Attached Xref\n\n 3. Right-click, and click Reload.\n\nHow does xref work in AutoCAD?\n\nAn XRef is an ‘external reference’ to another AutoCAD drawing file. One file can reference many other files and display them as if they were one. These are used in larger projects for many reasons: They keep the file sizes down.\n\nHow do I detach XREF with multiple references?\n\n\nWhat does xref mean?\n\nExternal Reference\n\nWhat is the difference between attachment and overlay in AutoCAD?\n\nAttachment: Saves a copy of the xref drawing in your drawing. Overlay: Creates a link to the xref drawing in your drawing.\n\nHow do you convert blocks to XREF?\n\nIn the External References palette, select the reference name that you want to bind. Right-click, and click Bind. In the Bind Xrefs dialog box, select one of the following options: Bind converts the objects in the xref into a block reference.\n\nIT IS INTERESTING:  How do I count shapes in Autocad?\n\nHow do you show xref in Autocad?\n\nUse this procedure to display a list of xrefs attached to a view drawing and to access the functions available for each xref.\n\n 1. On the Quick Access toolbar, click Project Navigator .\n 2. Click the Views tab.\n 3. In the Drawing Explorer, locate the view drawing for which to display external references.\n 4. Select the view drawing.\n\nWhy can I not detach XREF?\n\n\nWhat does Visretain do in Autocad?\n\nControls visibility, color, linetype, lineweight, and plot styles. Use this system variable in conjunction with the VISRETAINMODE system variable to manage which xref layer property overrides you want to automatically sync on reload. The layer table, as stored in the reference drawing (xref), takes precedence.\n\nHow do I replace one xref with another?\n\n\n\nHow do you refresh in AutoCAD?\n\nThe software allows the user to reload a layer by right-clicking on the layer and selecting the Reload Layer command. For example, to reload an external AutoCAD drawing that has just changed, use the Reload Layer command. This prevents the user from having to unload the drawing and then reopening the new drawing.\n\nIT IS INTERESTING:  How do you do rectangular selection in autocad?\n\nHow do I change the path for multiple xrefs in AutoCAD?\n\nLaunch the Reference Manager. Add drawings by clicking on Add Drawings or by drag-and-dropping them on the window. Select one or more drawings from the main window and click Find and Replace. In Find saved path, enter the drive letter to replace.\n\nSpecial Project", "pred_label": "__label__1", "pred_score_pos": 0.8098788857460022} {"content": "Photo Credits: Kelly Sikkema\n\n\nDespite having comparatively low emission levels, Uganda is at high-risk of the negative impacts of climate change. Average temperatures have risen by 1.3°C since 1960 and further increases of 2°C in the 50 years and 2.5°C in the next 80 years have been predicted. \n\nRainfall patterns are expected to become more concentrated, with fewer but heavier instances of rain, which may lead to increased instances of extreme weather events including drought and flooding. Climate change is expected to have a significant (negative) impact on Uganda’s economy, with agriculture, water, energy and transport the sectors most affected. \n\nManagement of the environment and sustainable development is enshrined in Uganda’s constitution and is a key objective within Vision 2040 – Uganda’s economic development strategy. Additionally, Uganda’s NDC and  the National Climate Change Policy have been designed to guide climate change activities and ensure a coordinated approach towards a climate-resilient and low-carbon development path for sustainable development in the country. \n\nAs a low-income country, Uganda does not have sufficient resources to fund its own climate change interventions. Currently, the majority of Uganda’s climate finance is being sourced from climate funds and multi- and bi-lateral development banks and partners. Both FDI and ODA have increased in the last decade however there are still gaps across the entire finance supply chain, particularly in project identification and refinance.\n\nDomestic capital markets in the country are developing quickly but there is still limited interest and understanding of climate-relevant sectors (such as renewable energy and agriculture). Consequently, available financial products and services do not serve the needs of all market participants (particularly small and medium sized enterprises). \n\nGoing forward, further technical assistance will be required to help build capacity of domestic financial institutions and develop appropriate instruments and asset classes. \n\n\n\n\nThe Climate Finance Pathfinder Uganda report includes an analysis of the country’s climate finance landscape, including: Uganda’s climate policies; current sources and types of funding; and a number of barriers and enablers for increased levels of climate finance. Based on our analysis of these factors, the report also offers a number of recommendations for how to mobilise increased levels of funding going forward. \n\nFunding for the report was provided by the Rockefeller Brothers Fund.\n\nof the population live in rural areas\n$ B\nin funding required to close the energy access gap\nof renewable energy generation potential\nof Uganda's have mobile money accounts\n$ B\nFDI inflows to Uganda in 2019", "pred_label": "__label__1", "pred_score_pos": 0.8181512355804443} {"content": "Question: How Do I Make My Address Private?\n\nHow do I know if my IP address is being monitored?\n\n\nHow do I give my address?\n\n\nCan you tell if someone is spying on your computer?\n\n\nHow do I hide my address from the public?\n\nHow to hide your home address.Immediately establish a P.O. Box or CMRA (commercial mail-receiving agency) and NEVER receive mail or packages at home. … Remove your home address from any of your company filings with the State and DO NOT serve as your own Registered Agent sharing your home/street address (our office at KKOS can provide this service).More items…•\n\nWho can see my Google activity?\n\n\nHow do you know if someone is searching for you on the Internet?\n\nDespite the promises of many websites, there is no easy way to determine if someone is searching for you on the Internet. A personal site or profile with a social network may give some information about searches for you.\n\nHow can I check my computer for spyware?\n\n\nHow do I make my Google address private?\n\n\nWhy does my address show up when I Google my name?\n\n\nCan you truly be anonymous online?\n\n\nWhy is my address showing on Google?\n\nFirst of all, Google is not directly showing your home address. It is giving search results that go to websites that specialize in this. Google is not a repository of addresses and names. So, you want to stop Google for giving a search result to a webpage that legally shares addresses?\n\nHow do I browse completely anonymously?\n\nSo, here’s a list you may find useful.VPNs. A VPN helps you maintain anonymity by hiding your real IP and internet activity from prying eyes. … TOR Browser. … Virtual machine. … Proxy servers. … Fake emails. … Incognito mode. … Ad blockers. … Secure messaging apps.More items…•\n\nCan other people see my Google Photos?\n\n\nCan someone see my Google searches?\n\n\nWhy doesn’t My maps show my address?\n\nDrag the marker to the position where the point of interest is located. Under “Which element is wrong?”, select “A place or landmark.” Under “Which place?”, select “Place isn’t listed.” Fill out the details under “Problem Description” and click Report Problem.\n\nHow do I hide my address on the Internet?\n\nThree ways to hide your IPUse a VPN. A VPN is an intermediary server that encrypts your connection to the internet — and it also hides your IP address. … Use Tor. Comprising thousands of volunteer-run server nodes, Tor is a free network that conceals your identity online via multiple layers of encryption. … Use a proxy.\n\nWhy does my address show up online?\n\nYour address may end up listed on random websites or on databases from nonprofit organizations and other businesses that have used your address for sales and business purposes. To remove your address from unwanted online sources, do a Google search with your name and address in the search query.\n\nHow do I stop my name from appearing on Google?\n\n\nCan I use the post office as my address?\n\nIn general, a post office box can be used instead of a street address when establishing a place for people to send mail, but not when someone needs to identify himself to the government. … So, if somebody has post office box #1234, and his post office is located at 100 Main St.\n\nCan I see how many times my name has been Googled?\n\n\nHow do you keep your address anonymous?\n\n\nHow do I remove my address from Google?\n\n\nWhat Google searches are illegal?\n\nHere are some of the internet search terms and topics that can be considered illegal and land you in jail:Child Pornography. Viewing content where persons under the age of 17 engage in sexually explicit activities is considered a sex crime. … Torrenting. … Questionable Explosive Terms. … Hiring an Assassin.\n\nHow do I get mail without an address?\n\n\nCan someone track your Internet activity?\n\n\nWhat is a ghost address?\n\n\nGoogle is a search engine. The purpose of a search engine is to find information that’s publicly available on the web. If you click a search result and see the information on a website, the first thing you need to do is to contact the webmaster of that website and request that the information be removed.", "pred_label": "__label__1", "pred_score_pos": 0.6404302716255188}